CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test
- 20 Questions
- Unlimited
- General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
Which of the following is used to guide the secure setup of systems and applications by providing a collection of security configuration settings?
Vulnerability scans
Benchmarks
Automated reports
Security groups
Answer Description
Benchmarks are collections of security configuration settings that provide guidance for the secure setup of systems and applications. They are often developed by communities of cybersecurity experts and provide a standard set of practices for ensuring that a technology is deployed securely.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are benchmarks in cybersecurity?
Who creates cybersecurity benchmarks?
How are benchmarks applied during system setup?
During a routine audit, your security team has discovered an unauthorized active directory tool being used by the marketing department to synchronize contact information across platforms. The team suspects that this is a case of Shadow IT. What is the PRIMARY risk associated with this discovery?
Decreased usage of IT-approved communication tools
Increased IT budget due to additional user licenses required for the unauthorized tool
Increased productivity and efficiency within the marketing department
Security breaches due to unauthorized applications bypassing organizational security processes
Answer Description
The correct answer is that the primary risk associated with Shadow IT is the potential for security breaches. This is because unauthorized applications and systems have not been vetted by the organization's security protocols. These tools might not be compliant with security policies, may not be regularly patched, and could lead to the exposure of sensitive data. While increased productivity is often the motivation for using such tools, and budget or usage of approved tools may be affected, the most significant risk from a security standpoint is the introduction of unmonitored vulnerabilities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Shadow IT?
How can Shadow IT lead to security breaches?
What are some ways to mitigate the risks of Shadow IT?
Which of the following statements best characterizes symmetric encryption when compared with asymmetric encryption?
It is primarily used to generate digital signatures that verify data integrity and origin.
It removes the need for any secure key-exchange process between communicating parties.
It relies on two mathematically related keys, one public and one private, for all cryptographic operations.
It uses a single secret key that both the sender and receiver use to encrypt and decrypt data.
Answer Description
Symmetric encryption uses a single shared secret key for both encryption and decryption. This design makes it computationally efficient but requires a secure method to distribute the key to all parties. In contrast, asymmetric encryption employs two mathematically related keys (a public key for encryption and a private key for decryption), eliminating the need to share the private key but at the cost of higher computational overhead. Statements describing key pairs, elimination of key-exchange requirements, or digital-signature creation refer to asymmetric encryption, not symmetric encryption.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the advantages of symmetric encryption compared to asymmetric encryption?
How is the secret key securely exchanged in symmetric encryption?
What are some common use cases for symmetric encryption?
A company is drafting its initial set of IT security documents. Among them, there is a need to establish a document that offers general advice and recommended practices for users to follow when dealing with company IT resources. Which type of security document should the company develop to fulfill this requirement?
Guidelines
Standards
Policies
Procedures
Answer Description
Guidelines are recommendations and best practices for users to follow. They are not strictly enforced but are designed to provide general advice on how to use IT resources securely. An organization would develop guidelines to offer staff general security advice. Policies, on the other hand, are mandatory rules that must be followed, and standards are specific low-level mandatory controls. Procedures are detailed step-by-step instructions on how to perform specific tasks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of security guidelines?
How do security guidelines differ from policies and procedures?
What are some examples of IT security guidelines?
An organization wants to detect unauthorized attempts to access their sensitive data. They decide to embed uniquely crafted bait elements within their data repositories that will trigger alerts when interacted with. Which of the following deception technologies would BEST achieve this objective?
Using honeytokens
Deploying a honeypot
Implementing honeyfiles
Setting up a honeynet
Answer Description
Honeytokens are uniquely crafted bait elements embedded within data systems to detect unauthorized access. They can be any type of data, such as fake records or credentials, that appear legitimate but are monitored for interactions. When a honeytoken is accessed or used, it triggers an alert, allowing the security team to identify and respond to potential security breaches. While a honeyfile is a specific type of honeytoken in the form of a file, using honeytokens provides a broader approach, not limited to just files. Honeypots and honeynets involve setting up decoy systems or networks, which are more suited for detecting external attackers rather than monitoring interactions within data repositories.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between honeytokens and honeyfiles?
How do honeytokens trigger alerts when accessed?
How are honeytokens different from honeypots and honeynets?
A network administrator is hardening a new web server and must configure the firewall to allow secure web traffic. Which TCP port should the administrator open to allow HTTPS connections by default?
443
143
3389
80
Answer Description
The correct answer is port 443. Hypertext Transfer Protocol Secure (HTTPS) is the standard protocol for secure web communication and uses TCP port 443 by default. Port 80 is used for unencrypted HTTP traffic. Port 143 is the default for Internet Message Access Protocol (IMAP), which is used for email retrieval. Port 3389 is used for Remote Desktop Protocol (RDP).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why does HTTPS use port 443 by default?
What is the difference between HTTP (port 80) and HTTPS (port 443)?
How does a firewall handle port configurations for HTTPS?
Which category of security controls involves managing day-to-day activities like incident response and change management?
Technical controls
Operational controls
Physical controls
Managerial controls
Answer Description
Operational controls are focused on the daily operational tasks that maintain security within an organization. They include procedures for incident response, change management, and access controls. These controls ensure that routine activities are carried out securely and effectively. Technical controls involve the use of technology to enforce security, such as firewalls and encryption. Managerial controls are policies and procedures set by management to guide the organization's security strategy. Physical controls are measures put in place to protect physical assets and facilities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the role of operational controls in an organization?
How do operational controls differ from technical controls?
What are some examples of incident response procedures in operational controls?
What term best describes an attribute of a security architecture focused on continuing service delivery in the event of component failures or other issues?
Maintainability
Scalability
Responsiveness
Resilience
Answer Description
Resilience refers to the ability of a system to continue to operate properly in the face of adversity. This can include redundancy, fault tolerance, and robust design choices that allow a system to endure and recover from disruptions. Scalability refers to the capacity of a system to handle growth, while maintainability concerns the ease with which a system can be kept operational. Responsiveness measures how quickly a system reacts to input.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is system resilience in security architecture?
How does resilience differ from fault tolerance?
What strategies can enhance resilience in security architecture?
Which type of disaster recovery site typically has infrastructure and utilities in place, but often requires additional configuration and data restoration before becoming operational?
Cold site
Hot site
Mobile site
Warm site
Answer Description
A warm site is a type of disaster recovery site that has the necessary hardware and connectivity in place but doesn't have client data continuously updated. This means that, in the event of a disruption, a warm site may require some time to restore recent backups and configure systems to become fully operational. It offers a middle ground between the immediate availability of a hot site and the lack of infrastructure of a cold site.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a warm site and a hot site?
Why would an organization choose a warm site over a cold site?
What types of scenarios are warm sites most commonly used for?
Which action best exemplifies the mitigation of a security risk within an organization's risk management strategy?
Establishing additional access controls to safeguard sensitive information.
Purchasing an insurance policy to transfer the risk associated with potential data breaches.
Acknowledging the existence of a security risk and choosing not to take corrective actions.
Deciding to stop all activities that are associated with a high level of risk to avoid it completely.
Answer Description
Mitigation refers to the implementation of measures to reduce the impact of a threat or to reduce the likelihood of its occurrence. Establishing additional access controls to safeguard sensitive information makes it more difficult for unauthorized users to access this information, thus reducing the potential impact of a data breach. On the other hand, transferring the risk involves shifting the responsibility to another entity, such as through insurance. Avoiding the risk would mean completely eliminating the threat, which can be unrealistic for some risks, and accepting the risk would indicate no further actions to decrease its impact.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are access controls, and how do they mitigate risks?
How does risk mitigation differ from risk transference or acceptance?
Why might organizations choose mitigation over risk avoidance?
A security administrator is responsible for maintaining the integrity of software deployed in the company's server environment. They need to detect any unauthorized software modifications and ensure that only approved packages are running on the systems. Which solution should the administrator implement to meet these requirements?
Configuring systems to receive automatic software updates
Implementing a file integrity monitoring solution that automatically checks for changes to software packages
Maintaining a configuration management database that records installed software versions
Performing regular antivirus scanning on all servers
Answer Description
Implementing a file integrity monitoring solution that automatically checks the integrity of system and application software files is the correct answer because such a solution can detect changes to critical system files and software packages, alerting administrators if unauthorized modifications occur. Using automatic updates does not necessarily check for unauthorized modifications; it just updates software to the latest versions. Scanning with an antivirus checks for malware but does not validate software package integrity or unauthorized changes. Using a configuration management database is helpful for tracking changes but does not automatically monitor file integrity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is file integrity monitoring?
How does a file integrity monitoring solution detect unauthorized changes?
What are some common tools used for file integrity monitoring?
An organization is concerned about unauthorized individuals entering its data center. Which of the following security measures would BEST prevent intruders from gaining physical access?
Implementing CCTV cameras to monitor the data center
Reviewing access logs for suspicious activity
Installing biometric access controls on the data center doors
Conducting regular security awareness training for employees
Answer Description
Installing biometric access controls on the data center doors is a preventive control that effectively stops unauthorized individuals from entering by requiring unique biological characteristics, such as fingerprints or retinal scans. This ensures that only authorized personnel can gain access, directly preventing unauthorized entry. Implementing CCTV (Closed-Circuit Television) cameras helps in monitoring and potentially deterring intruders but does not physically prevent access; it serves more as a deterrent and a detective control. Conducting regular security awareness training is important but focuses on educating employees rather than directly preventing unauthorized physical access. Reviewing access logs for suspicious activity is a detective control that identifies unauthorized access after it has occurred, not preventing it.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are biometric access controls more effective than traditional methods like keycards?
What is the difference between preventive, detective, and deterrent controls in security?
How do biometric systems protect against spoofing or impersonation attempts?
Your employer has several thousand internal users all who need to access the internet on a daily basis to complete their work. What technology should be used to mask the internal IP addresses of these users and allow access to the internet through shared public IP addresses?
DMZ
Router
NAT
DNS
Answer Description
Network Address Translation (NAT) allows many devices to share an IP when accessing another network. Most commonly it is used to allow internal devices to share public IP addresses when accessing the internet. Benefits of NAT include minimizing the number of public IP addresses required (they cost money and for IPv4 there is a limited number available) as well as masking the origin of the request which provides security benefits. Generally NAT is used on a router or firewall.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is NAT and how does it work?
What are the differences between NAT and a DMZ?
Why is NAT important in IPv4 networks, and how does it differ from IPv6?
A company must comply with the laws of the country where its data is physically located, regardless of the organization's country of origin.
False
True
Answer Description
The correct answer reflects the principle of data sovereignty, which dictates that data is subject to the laws and governance structures of the nation in which it is stored. Even if the company is not based in that nation, it must comply with those local laws. Companies often have to navigate complex legal environments, ensuring they comply with the laws in all the territories they operate in, including where their data resides.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is data sovereignty?
How does data sovereignty differ from data residency?
Why is data sovereignty challenging for companies with global operations?
Which statement BEST describes the role of automated reports generated by a security information and event management (SIEM) system in day-to-day security operations?
They provide final, fully validated decisions that can be acted on immediately without further review.
They present aggregated security data but still require analyst review to validate context and determine the appropriate response.
They are generated directly by endpoint detection and response (EDR) tools rather than SIEM platforms.
They are useful only for meeting compliance reporting requirements and are not intended for operational security.
Answer Description
Automated SIEM reports aggregate and correlate large volumes of log data to highlight suspicious patterns and potential incidents. While they save time by surfacing notable events, they are not authoritative verdicts. Security analysts must review the reports, validate the context of each alert, tune correlation rules, and separate true threats from false positives before initiating a response. Treating the reports as final decisions can lead to wasted effort on benign events or missed indications of compromise.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a SIEM system?
Why do SIEM reports require analyst review?
How do SIEM systems differ from EDR tools?
A company issues smartphones to field sales staff who frequently travel between cities. Which connection method allows these devices to keep Internet and voice connectivity as they move, automatically handing communications from one base station to the next over large geographic areas?
Wi-Fi Direct
Near Field Communication (NFC)
Cellular network
Bluetooth
Answer Description
Cellular networks use geographically distributed base stations (cells) and seamless handovers so a mobile device can maintain voice and data sessions while moving. Bluetooth, NFC, and Wi-Fi Direct are short-range technologies that do not provide wide-area, tower-to-tower mobility.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How do cellular networks enable handoffs between cell towers?
What is the difference between a cellular network and Wi-Fi?
How does 4G or 5G enhance cellular network performance?
A security administrator needs to deploy a network security device that will analyze and potentially block malicious traffic without being bypassed if it fails. Which deployment option aligns best with this requirement?
Deploy the device in inline mode with fail-closed configuration.
Use port mirroring to duplicate traffic to the device.
Implement the device as an external monitor that gets copied traffic from a network switch.
Set up the device as a network tap to passively monitor traffic.
Answer Description
An inline device is deployed directly on the network path; all traffic must pass through it. This is ideal for scenarios where traffic analysis and blocking potential threats is necessary. Furthermore, since the device must not be bypassed even if it fails, an inline device must be used instead of a tap or monitor mode, which allows traffic to bypass the device if it fails or is not active.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'inline mode' mean in the context of network devices?
What does 'fail-closed' configuration mean, and why is it important?
How does deploying a network tap or using port mirroring differ from inline mode?
A security analyst is developing documentation to standardize the response process for common security incidents. This documentation will outline specific steps, actions, and decision points for handling events like phishing attacks and malware infections. Which of the following is being created?
An Acceptable Use Policy (AUP)
A Business Impact Analysis (BIA)
A playbook
A risk register
Answer Description
A playbook is a document that provides a step-by-step guide for responding to a specific type of security incident, such as ransomware or a data breach. A Business Impact Analysis (BIA) is an assessment used to identify critical business functions and determine the potential effects of their disruption. A risk register is a tool for documenting and tracking identified risks. An Acceptable Use Policy (AUP) is a policy that defines the rules and constraints for how users may use an organization's resources.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of a playbook in cybersecurity?
How does a playbook differ from a Business Impact Analysis (BIA)?
Why is a playbook more suitable for incident response than a risk register?
What is a key activity performed as part of security monitoring to identify unauthorized actions within a network?
Deploying security patches
Reviewing security logs
Installing antivirus software
Modifying access control lists
Answer Description
Reviewing security logs is a key part of security monitoring. It allows security professionals to track events that have occurred within the network. Monitoring these logs helps to identify any unauthorized actions, security incidents, or policy violations. Other options listed do not directly correspond to the activity of identifying unauthorized actions through monitoring.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are security logs important for monitoring unauthorized actions?
What tools are commonly used to review and analyze security logs?
What is the difference between security log monitoring and real-time threat detection?
An organization plans to deploy a public-facing web application that is expected to receive heavy traffic. To guarantee that no single backend server becomes a bottleneck and to maintain high availability, which device should be placed in front of the server farm to distribute incoming client requests across multiple servers?
Intrusion detection system (IDS)
Proxy server
Load balancer
Firewall
Answer Description
A load balancer spreads client requests across several backend servers, optimizing resource utilization, reducing response times, and preventing any individual server from becoming overwhelmed. A proxy server merely acts as an intermediary for requests, an intrusion detection system monitors traffic for malicious activity, and a firewall enforces security rules; none of these devices natively distribute traffic among multiple servers the way a load balancer does.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a load balancer distribute traffic?
What is the difference between a load balancer and a firewall?
Are there different types of load balancers?
Smashing!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.