CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 20
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
In an effort to streamline client interaction processes, a business is transitioning to a sophisticated platform designed for this purpose. The analytics division requires permissions to generate reports and review client data, while the account management division needs the ability to engage with and alter client records. What is the BEST strategy for assigning the appropriate level of system access in accordance with each division's responsibilities?
Institute a policy where access is determined by the seniority of the personnel within the organization
Allow division heads to grant access as they see fit for their respective teams
Grant all divisions the same level of access to simplify management of the new platform
Utilize a predefined set of roles that are specific to user job functions to regulate access within the platform
Answer Description
The best strategy is to assign access rights according to the functions necessary for each job role within the new platform. The analytics division should receive a viewing and reporting role to access and analyze data without the risk of altering it, enhancing data integrity. Conversely, the account management division should be given a more comprehensive role that encompasses the creation, viewing, updating, and deletion of client records, aligned with their day-to-day account maintenance and client interaction tasks. This access control mechanism follows the principle of 'least privilege,' granting users only the permissions necessary to perform their jobs, which is a fundamental aspect of secure role assignments. Using 'RBAC' without explaining its meaning or acronym form could lead to confusion for those unfamiliar with the term, highlighting the necessity for clarity in both teaching and testing environments.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is RBAC in access control?
What is the principle of least privilege?
Why shouldn’t access be based on seniority?
In the context of security control types, which of the following BEST describes the primary purpose of an Intrusion Detection System (IDS)?
Corrective control
Deterrent control
Preventive control
Detective control
Answer Description
An Intrusion Detection System monitors network or host activity and generates alerts when suspicious behavior is detected. Because it identifies potential incidents rather than blocking or remediating them, it is categorized as a detective control. Preventive controls (e.g., firewalls) attempt to stop incidents, corrective controls focus on recovery, and deterrent controls primarily discourage attackers.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does an Intrusion Detection System (IDS) do?
How is an IDS different from an Intrusion Prevention System (IPS)?
What are examples of detective controls besides IDS?
A financial institution needs to ensure continuous availability of its critical transaction processing system while maintaining data integrity and security. They require a solution that provides automatic failover and keeps data consistent across servers in case one server fails. Which of the following strategies should they implement to meet these requirements?
Deploy virtualization to run multiple virtual servers on one physical machine
Set up load balancing to distribute traffic across servers
Use network segmentation to isolate the transaction system
Implement server clustering with shared storage and replication
Answer Description
Implementing server clustering with shared storage and replication meets the institution's needs. Clustering provides high availability and automatic failover, ensuring that if one server fails, another takes over seamlessly. Shared storage and replication keep data consistent across servers, which is crucial for data integrity.
Load balancing improves performance by distributing traffic but doesn't guarantee data consistency or automatic failover with synchronized data.
Deploying virtualization can create a single point of failure and doesn't offer the necessary failover or data replication features.
Network segmentation enhances security by isolating systems but doesn't address the requirements for high availability and data consistency.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is server clustering and how does it ensure high availability?
What is shared storage with replication, and why is it important for data consistency?
How does load balancing differ from server clustering?
A company has implemented a new policy requiring IT management to conduct security reviews of all vendors before onboarding them. The reviews need to ensure that the vendors are adhering to the same security standards as the company. Which of the following actions is MOST effective for assessing the vendors' adherence to these standards?
Reviewing the vendors' privacy policies.
Examining product data sheets for security features.
Conducting third-party security audits of the vendors.
Comparing the Service Level Agreements (SLAs) to the company's standards.
Answer Description
Conducting third-party security audits is the most effective way to assess vendors' adherence to security standards. These audits often include an in-depth analysis of the vendors' security policies, practices, and controls. This can provide an objective and comprehensive overview of the vendors' security posture and compliance with relevant standards. Reviewing the vendors' privacy policies is important but may not offer a complete picture of their security practices. Examining product data sheets only provides information about the products and not the vendors' security standards. Comparing SLAs can showcase the guaranteed performance and availability, but it does not directly address security compliance.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are third-party security audits more effective than simply reviewing a vendor's privacy policies?
What are the key components of a third-party security audit?
What is the significance of aligning vendor security audits with industry standards like ISO 27001 or SOC 2?
A large enterprise with critical uptime requirements needs to implement a feature in their file system to help maintain a consistent state of their files post any system crashes. Which of the following would BEST ensure that file changes are systematically recorded, facilitating a quick restoration of the last known good state after a crash?
Utilizing RAID configurations for data redundancy
Enforcing strict file permissions
Implementing a file system with journaling capabilities
Relying on routine snapshots of the data
Answer Description
Journaling in the context of file systems is used to record changes not yet committed to the file system, which can protect against corruption and ensure the file system can be reliably restored to a good state in the event of a crash. This feature is specifically designed to track changes in a sequential log, providing a mechanism for recovery that does not depend on the file system's regular write processes, which might be incomplete at the time of a crash.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a journaling file system?
How does journaling differ from using RAID configurations for data protection?
Can journaling completely prevent data loss in a crash?
During a post-implementation review, the security team notes that the new e-commerce platform must continue to meet performance and security requirements even if user traffic doubles over the next year. Which design characteristic best describes this requirement?
Durability
Scalability
Adaptability
Flexibility
Answer Description
Scalability is the property of a system, network, or process that enables it to handle a growing amount of work or be enlarged to accommodate that growth without degrading performance or security. Adaptability and flexibility focus on a system's ability to change functionality, while durability concerns its resistance to failure; none of these directly address workload growth.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key factors that make a system scalable?
How does scalability differ from flexibility in a system?
Why is scalability important for security in a growing system?
A C-level executive has contacted the security team and asked if you can verify the authenticity of an email. The email appears to have come from a bank saying their password has been compromised. The executive states they don't use this bank. After some investigation you find this email went out to around fifty percent of internal email addresses. Which term correctly describes this attack scenario?
Spear phishing
Trojan Horse
Phishing
Worm
Whaling
eVishing
Answer Description
This scenario describes a phishing attack, but tries to trick you by mentioning a high level executive was targeted which would make it whaling. However because half the internal email addresses were also sent this email it is a more generic phishing attack. Whaling would apply only if high level executives were targeted, not a large chunk of the organization.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What differentiates phishing from spear phishing and whaling?
Why would phishing emails target a wide audience instead of specific individuals?
How can I recognize and protect myself from phishing attacks?
In a recent audit of a secure facility, it was noted that the employee access system employs badges that are not programmed to confirm the identity of the badge reader before transmitting data. Which specific vulnerability are these badges most at risk of?
Encryption breaking
Social engineering tactics
Radio-Frequency Identification (RFID) cloning
Email compromise
Answer Description
The badges in question are at risk of Radio-Frequency Identification (RFID) cloning. The lack of a mutual authentication process in the badge system permits an attacker to easily capture the badge's signal and create a duplicate without being verified by the reader. This process leads to unauthorized individuals potentially gaining access to secured facilities. Mutual authentication is a security feature where a badge and its reader verify each other before any data is transmitted. Options such as 'Email compromise' and 'Social engineering tactics' are not directly related to the scenario described where radio-frequency signals could be exploited. 'Encryption breaking' is also incorrect as it doesn't directly pertain to the cloning of an RFID signal, which is an issue distinct from cryptographic weaknesses.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is RFID cloning and how does it work?
What is mutual authentication, and why is it important for RFID badges?
How can organizations secure their RFID-based access systems?
An organization is experiencing incidents where employees receive emails that install malware when links are clicked. Which of the following would be the BEST method to mitigate this threat?
Educating users on how to identify and report phishing emails
Deploying anti-malware software on all devices
Enforcing strict password policies
Implementing email filtering to block malicious messages
Answer Description
Educating users on how to identify and report phishing emails is the most effective method because it directly addresses the human factor, which is often exploited in such attacks. While implementing email filtering and deploying anti-malware software can help reduce the number of malicious emails and detect malware, they cannot prevent all threats. Enforcing strict password policies does not prevent users from clicking on malicious links in emails.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is phishing and why is it a common attack method?
How can email filtering help prevent phishing attacks?
What are best practices to identify phishing emails?
An organization needs to enforce consistent security settings across all Windows workstations. Which tool should the administrator use to centrally manage these settings?
Local security policies
Manual configuration of each workstation
Group Policy
Individual firewall settings
Answer Description
Group Policy is designed to centrally manage and enforce security settings across multiple Windows workstations, ensuring consistency and ease of administration. Local security policies, manual configuration, and individual firewall settings do not provide centralized management and consistency.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Group Policy and how does it work in Windows?
How does Group Policy differ from Local Security Policies?
What are some examples of settings that can be enforced using Group Policy?
When conducting a risk analysis, what is the term used to describe the probability that a given threat is capable of exploiting a particular vulnerability within an organization's security?
Vulnerability
Impact
Threat Level
Likelihood
Answer Description
The term 'Likelihood' refers to the probability that a given threat could potentially exploit a specific vulnerability within an organization's security framework. Understanding and determining the likelihood is crucial in risk management as it helps prioritize risks and informs decision making regarding the implementation of controls.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What factors can influence the likelihood of a threat exploiting a vulnerability?
How does likelihood differ from impact in a risk assessment?
How do organizations calculate or measure likelihood in a risk analysis?
A company is enhancing its disaster recovery strategies to improve its ability to maintain continuity of operations after a catastrophic system failure. Considering the importance of being able to resume mission-critical activities swiftly and efficiently, which of the following options should be the company's MAIN focus?
Establishing a hot site to facilitate immediate failover
Implementing more frequent backups of all critical systems
Setting up a cold site with basic infrastructure and no pre-installed systems
Transitioning to a warm site that can be operational within a few days of an incident
Answer Description
Hot sites are fully equipped data centers that can take over functionality from the primary site immediately or within a minimal time frame after a disaster. This allows for continuity of operations and a swift return to normal activities, which is crucial for maintaining mission-critical processes during an unplanned interruption. Cold sites, while less expensive, require more time to set up and are not ideal for immediate failover. Warm sites offer a middle ground but still involve a delay in resumption compared to hot sites. While backups are important, they are typically used to restore data and do not by themselves ensure operational continuity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a hot site, cold site, and warm site in disaster recovery?
Why are hot sites more expensive compared to cold or warm sites?
How do hot sites ensure immediate failover in disaster recovery?
You have ordered a penetration test on the company's website from a third-party IT security consultant. Your web administration team has created a stand-alone test network to ensure the penetration test does not cause issues on the live website. Other than the IP address of the web server, you have not provided the penetration testers with any other information. What type of test best describes this scenario?
Integration
White-box
Stand-alone
Black-box
Answer Description
This type of penetration test is known as a black-box test. In this approach, the testers are given little to no prior information about the target system. For example, they are not provided with details like the web server type or access to the source code. Instead, the testers must perform reconnaissance to gather information and probe for vulnerabilities, simulating an attack from an external threat actor with no inside knowledge.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is reconnaissance in a black-box test?
How does a black-box test differ from a white-box test?
Why is a stand-alone test network important in penetration testing?
An organization needs to ensure that encrypted data remains accessible even if an employee's cryptographic credentials are lost or become unavailable. Which of the following methods BEST achieves this objective?
Applying key stretching techniques
Implementing key escrow
Utilizing certificate revocation lists
Issuing digital certificates
Answer Description
Implementing key escrow involves securely storing copies of cryptographic keys with a trusted third party or designated authority. This allows the organization to recover encrypted data if the original keys are lost or inaccessible. Key stretching strengthens weak keys against brute-force attacks but does not help in recovering lost keys. Digital certificates associate public keys with user identities but do not provide a means for key recovery. Certificate Revocation Lists (CRLs) are used to revoke untrusted certificates and do not aid in data recovery.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is key escrow important for key recovery?
How does key stretching differ from key escrow?
What role do digital certificates play in cryptography?
A healthcare organization relies on specialized equipment that operates on a legacy system which cannot be patched due to vendor abandonment. To maintain the highest level of security, what should be the organization's FIRST step in mitigating the risks associated with the inability to patch this system?
Applying antivirus software updates more frequently
Scheduling more frequent vulnerability scans
Network segmentation
Deploy an additional firewall specifically for the legacy system
Answer Description
The correct answer is 'Network segmentation'. This practice would isolate the legacy system from the rest of the network, reducing the potential impact of a vulnerability being exploited. While other options like intrusion detection systems and replacement could also be considered, they do not immediately address the risk of the legacy system being compromised. Network segmentation is a straightforward mitigation step that can be applied without requiring the removal of critical, yet non-patchable, equipment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is network segmentation the best first step for securing legacy systems?
How does network segmentation differ from deploying a firewall for protection?
What are some additional steps that can complement network segmentation in securing legacy systems?
You are selecting a biometrics system for your company. You want to make sure you select a system that is going to be the most accurate choice. What calculation would you use to compare the different systems?
FRR
CER
Efficacy rates
FAR
Answer Description
The crossover error rate (CER) is the point at which the false acceptance rate (FAR) and the false rejection rate (FRR) are equal. The lower the CER the more accurate the biometric system is.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are FAR and FRR in biometrics?
How is the crossover error rate (CER) calculated?
Why is CER important when selecting a biometric system?
Which hardware-based security solution is specifically designed to securely generate, store, and manage cryptographic keys for a wide variety of applications?
Key Management System
TPM
HSM
Secure Enclave
Answer Description
A Hardware Security Module (HSM) is a physical computing device that safeguards and manages digital keys, performs encryption and decryption functions for digital signatures, and provides strong authentication. HSMs are specifically designed for the secure generation, storage, and management of cryptographic keys, offering a higher level of security compared to software-based key management solutions. They are widely used in applications requiring high-level security, such as banking, government, and healthcare.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an HSM and how does it differ from a TPM?
What are some common use cases of HSMs in industries?
Why are HSMs considered more secure than software-based key management systems?
During disposal of storage media, due to regulatory requirements some of the data is required to be saved for a certain period of time. This is an example of what?
Data retention
Certification
Sanitization
Destruction
Answer Description
There are times when certain data is required to be kept for a certain period of time due to legal, regulatory or policy reasons. There are also requirements pertaining to when data isn’t supposed to be kept. This is all referred to as data retention.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is data retention and why is it important?
What are some common laws or regulations that mandate data retention?
How does data retention differ from data destruction?
Which of the following BEST describes the responsibility of an Owner in the context of data management and protection within an organization?
Designing and implementing the system's technical architecture that supports data processing requirements
Conducting periodic audits and reviews of access controls and security measures
Determining the classification of the data and the necessary controls for its protection
Executing routine tasks such as data backups and applying security patches to the data management systems
Answer Description
The Owner of a system or data is primarily responsible for determining the classification of the data and the controls necessary to protect it. They make decisions on how the data should be handled, dictate access controls, and are often decision-makers on acceptable risk levels for their data. While they may delegate certain tasks to others like Custodians or Processors, the Owner retains the ultimate responsibility for the data's security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a Data Owner and a Data Custodian?
What are examples of data classification levels?
How does a Data Owner balance security with operational needs?
When securing a wireless network, which of the following is important for preventing unauthorized access and ensuring that only authenticated users can connect?
Using WEP encryption
Enabling WPA3
Hiding the SSID
Implementing MAC filtering
Answer Description
Enabling WPA3 on a wireless network provides robust security by using modern encryption methods and management of authentication protocols. This prevents unauthorized users from accessing the network without the correct credentials, thereby securing the wireless communication. WEP is an outdated and insecure encryption method that is easily breached by attackers. Hiding the SSID does not provide security, as the network can still be detected by attackers with the right tools. MAC filtering is not a robust security measure because MAC addresses can be easily spoofed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is WPA3 and how does it improve wireless network security?
Why is WEP considered insecure for wireless networks?
Why is MAC filtering not a robust security measure?
Nice!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.