CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 20
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
Implementing compensating controls post-scan can effectively diminish the necessity for rescanning a system after initial vulnerability identification.
False
True
Answer Description
This statement is misleading and thus incorrect. Compensating controls may mitigate the risk of identified vulnerabilities, but they do not replace the need for rescanning the system. Rescanning is essential to verify that vulnerabilities have been effectively addressed and that the compensating controls or applied patches are functioning as expected. Additionally, new vulnerabilities may have been discovered since the last scan, or changes to the system could introduce new security gaps, further necessitating rescanning. Incorrect answers might appear convincing because compensating controls do play a role in decreasing the risk of known vulnerabilities; however, they are not a substitute for the verification process provided by a follow-up scan.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are compensating controls in the context of cybersecurity?
Why is rescanning important after addressing a vulnerability?
Can compensating controls fully replace vulnerability remediation?
An organization's security policy mandates that any implemented security solutions must not interfere with network traffic or introduce potential points of failure, but the company still wants to be alerted to any suspicious activities on the network. Which of the following would BEST achieve this goal?
Deploying a firewall with deep packet inspection
Installing an Intrusion Prevention System
Implementing an Intrusion Detection System
Using a Content Filter
Answer Description
An Intrusion Detection System (IDS) operates passively by monitoring network traffic and alerting administrators to suspicious activities without interfering with the traffic flow or introducing latency. It does not become a point of failure because it does not sit inline with the network traffic. In contrast, an Intrusion Prevention System (IPS) actively analyzes and can block or modify traffic to prevent threats, potentially introducing latency and becoming a point of failure. A firewall filters network traffic and can affect performance or interfere with legitimate traffic. A Content Filter inspects and potentially blocks specific content, which can also interfere with traffic and introduce latency.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the main difference between an IDS and IPS?
How does an IDS detect suspicious activities?
Why might an organization prefer an IDS over an IPS?
An IT security manager has noticed a recent uptick in confidential information being leaked through casual conversations on the company's authorized instant messaging (IM) platform. While reviewing the IM security policies, what should the manager implement to reduce the risk of data leakage through IM chats?
Configure Data Loss Prevention (DLP) policies on the IM system
Restrict file permissions for users on the network
Enforce end-to-end encryption for all IM communications
Assign dedicated staff to manually review IM message logs for sensitive data
Answer Description
Configuring DLP policies to monitor and block sensitive information being sent through IM helps prevent data leaks. The IM system can be set up to detect and stop the transmission of predetermined sensitive information patterns. Use of encryption would make messages secure in transit but would not prevent employees from sharing sensitive information. Restricting file permissions is unrelated to IM conversations. Manually reviewing message logs is less efficient and might not effectively prevent leaks compared to automated DLP mechanisms.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Data Loss Prevention (DLP)?
How do DLP policies work on an instant messaging platform?
Why is encryption insufficient to prevent data leakage on IM platforms?
What does the term 'complexity' relate to in the context of security operations?
The difficulty level of an attacker required to exploit a system
The number of users that have access to a system
The extent to which systems, processes, and technologies are interconnected and intricate, potentially making them harder to secure
The level of encryption used to protect data
Answer Description
Complexity in security operations pertains to the intricacy of systems, processes, and technologies that could potentially increase their vulnerability to attacks. More complex systems are harder to manage and secure, because the likelihood of misconfiguration and undiscovered vulnerabilities increases. Simplifying systems can lead to more robust and easier to manage security postures.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why does increased complexity make systems harder to secure?
What strategies can be used to reduce complexity in security operations?
How does complexity in systems relate to specific types of attacks?
You have been called to the office of the CEO for a confidential meeting. In the meeting the CEO informs you he 'has a virus that won't let him login without paying a fee.' You begin to investigate the issue and find that the CEO downloaded a file from a website a friend shared on a social media site. After downloading the file his computer restarted and now will not allow anyone to login unless they enter credit card information. Which option best describes the attack used in this scenario based on the information available?
The CEO downloaded and executed Ransomware
A botnet is attacking the CEO's computer and disabling login attempts
The CEO executed a Rootkit which gave backdoor access to a hacker
The CEO was the target of a spear phishing social engineering attack
Answer Description
This type of malware is called Ransomware. It holds data or information ransom until a fee is paid after which point it will return the information or data (or so it says...). Based on the information available in the question this is the only conclusion we can make. It is possible as the CEO of the company they were targeted specifically via social media (spear phishing) but there isn't definitive evidence of this yet.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does Ransomware work?
What is the difference between Ransomware and a Rootkit?
How can you prevent Ransomware attacks?
Crucial Technologies is standing up a new web server. The website hosted on this server is required to be accessed by the general public as part of company operation. To provide security to internal company resources where should the server be placed on the network?
Extranet
VLAN
Screened subnet
Intranet
Answer Description
A screened subnet is a sectioned off perimeter network that is isolated from the internal network. The screened subnet provides additional security from external threats by housing public facing resources.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a screened subnet?
Why is a screened subnet more secure than placing the server on an internal VLAN?
What is the difference between a screened subnet and an extranet?
Which access control method combines elements such as user role, the resource being accessed, and the current time to make an access decision?
Attribute-based access control
Discretionary access control
Mandatory access control
Role-based access control
Answer Description
Attribute-based access control is the correct answer because it is a method that defines an access control paradigm whereby access rights are granted to users through the use of policies that combine different attributes. These attributes can be associated with the user, the resource being accessed, the current time, and even the current environmental conditions. This is different from role-based access control that focuses solely on the roles that users have, discretionary access control which allows owners to define access, and mandatory access control which enforces access based on a centralized policy.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Attribute-Based Access Control (ABAC)?
How does ABAC differ from Role-Based Access Control (RBAC)?
What are examples of attributes used in ABAC policies?
An attacker infiltrates a company's network and steals customer credit card information. What is the likely motivation behind this attack?
Financial gain
Espionage
Data exfiltration
Revenge
Answer Description
Financial gain is the likely motivation because the attacker can use or sell the stolen credit card information for monetary profit. Espionage involves obtaining confidential information for strategic advantage, typically in a political or corporate context, which is not indicated here. Revenge would suggest the attacker has a personal vendetta against the company, but there is no such indication. Data exfiltration refers to the unauthorized transfer of data, but in this context, it's the means rather than the motivation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between financial gain and data exfiltration in a cyberattack?
How do attackers monetize stolen credit card information?
How is espionage different from other cyberattack motivations like financial gain?
What type of security control is implemented when the primary control cannot be used due to technical, financial, or operational constraints?
Deterrent controls
Detective controls
Compensating controls
Preventive controls
Answer Description
Compensating controls are used as a substitute for primary controls when the primary control is not feasible or practical to implement. They provide an alternative way to mitigate risks and achieve the same level of security. For example, if a company cannot afford to implement a firewall (a preventive control), they may use a virtual private network (VPN) as a compensating control to protect their network traffic.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of compensating controls?
How do compensating controls differ from preventive controls?
When would a compensating control typically be implemented?
A corporation is evaluating the possible financial impact of an internal network compromise. With the internal network assets valued at $2 million, which of the following best illustrates the 'Exposure Factor' for this risk assessment?
The $2 million total value of the network assets that are at risk.
The likelihood, expressed as a percentage, that the network assets will be compromised each year.
The estimated percentage of the $2 million that would be lost if the network is compromised.
The annual amount required to insure the $2 million worth of network assets against compromise.
Answer Description
Exposure Factor is the percentage of the asset's value that is estimated to be lost due to a security incident. It represents the magnitude of the impact should a security breach occur in terms of the asset's value. In this scenario, identifying the percentage of the $2 million in assets that would potentially be lost during a network compromise is a direct application of the 'Exposure Factor' concept.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Exposure Factor in risk assessment?
What is the difference between Exposure Factor and Single Loss Expectancy?
How is Exposure Factor used in the risk assessment process?
What is the common title for senior management members responsible for overseeing data in their domain?
Data manager
Data administrator
Data protector
Data owner
Answer Description
Data owners are usually individuals in senior management and have overall responsibility for the data within their area of the organization. The data owner for HR data would typically be senior staff within the HR department.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main responsibilities of a data owner?
How does a data owner's role differ from a data administrator?
What happens if a data owner fails to fulfill their responsibilities?
Your company is planning to deploy a critical server infrastructure that must maintain high availability. As a security architect, you are responsible for recommending a solution to ensure that the infrastructure remains operational in the event of a power outage. Which of the following would provide the best protection?
Install an Uninterruptible Power Supply (UPS) for the critical servers.
Establish a large array of battery banks to provide additional power.
Use surge protectors to prevent damage from power surges.
Implement redundant power supplies in each critical server.
Answer Description
An Uninterruptible Power Supply (UPS) provides backup power to the infrastructure in the event of a power outage, ensuring the servers remain operational until either the main power is restored or a longer-term solution like a generator can take over. Surge protectors, while they protect against voltage spikes, do not provide power during an outage. Redundant power supplies ensure the servers can continue to operate if one power supply fails, but they require power from an external source and will not protect against an outage. Battery banks can store power but generally do not switch as rapidly as a UPS to provide uninterrupted power.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main components of a UPS and how do they work?
How does a UPS differ from a generator in terms of backup power?
What limits the effectiveness of a UPS during extended outages?
Which factor is a direct financial consideration when assessing the implementation of a new security control within an organization?
Time to remediate vulnerabilities
Time-to-market
Number of users supported
Total cost of ownership
Answer Description
Total cost of ownership includes the direct and indirect costs incurred throughout the life cycle of a security control, encompassing purchase price, maintenance fees, operational costs, and potential training expenses. This is critical as it reflects the overall investment needed and impacts the budgeting and financial planning of an organization's security strategy. Other options, like the time-to-market or the number of users, may indirectly influence costs but are not direct financial considerations on their own. The time to remediate vulnerabilities focuses on the duration of the response rather than on financial implications.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Total Cost of Ownership (TCO)?
How does TCO differ from initial purchase cost?
Why is TCO important for security planning?
An organization experienced a data breach compromising customer data. Following the incident, the security team implemented measures to restore affected systems and reduce the impact of the breach. Which of the following actions is an example of a corrective control?
Conducting a forensic analysis to determine how the breach occurred.
Restoring data from backups and applying patches to affected systems.
Implementing stronger network firewalls to prevent future breaches.
Displaying warning banners on login screens to deter unauthorized access.
Answer Description
Restoring data from backups and applying patches to affected systems are actions that limit the damage after an incident, making them examples of corrective controls. These steps aim to fix the issues caused by the breach and prevent further impact. Conducting a forensic analysis is a detective control, as it involves identifying how the breach occurred. Implementing stronger network firewalls is a preventive control designed to stop future incidents. Displaying warning banners is a deterrent control meant to discourage unauthorized access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between corrective, preventive, detective, and deterrent controls?
Why is restoring data from backups considered a corrective control?
How does applying patches help as a corrective control?
Which scenario best illustrates the principle of 'Continuous' risk assessment in an organization's risk management process?
Conducting thorough risk assessments at the end of each fiscal year based on yearly metrics
Integrating real-time threat intelligence with security systems to dynamically assess risks
Performing risk assessments after major changes to IT infrastructure or system updates
Scheduling biannual security audits to review and assess organizational risks
Answer Description
The correct answer is the implementation of real-time threat intelligence integrated with security systems for dynamic risk assessment, which exemplifies a continuous risk assessment approach. This approach ensures immediate identification and evaluation of risks as they emerge, allowing for prompt risk management actions. The other options describe more periodic, reactionary, and infrequent methods, which do not reflect the ongoing nature inherent to continuous risk assessment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is continuous risk assessment?
What is real-time threat intelligence?
How does continuous risk assessment differ from periodic assessments?
A security administrator at a mid-size company is selecting an algorithm for secure email encryption that relies on a public/private key pair rather than a shared secret, to implement digital signatures as well. Which of the following algorithms satisfies this requirement?
Blowfish
RSA
AES
RC4
Answer Description
RSA uses mathematically linked public and private keys to encrypt or sign data, making it an asymmetric algorithm. The other listed algorithms-AES, Blowfish, and RC4-are all symmetric ciphers that rely on the same shared key for both encryption and decryption.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is RSA and why is it suitable for secure email encryption?
How does RSA differ from symmetric encryption algorithms like AES or Blowfish?
What role do digital signatures play in RSA and email encryption?
Your company has issued laptops to its employees for remote work. During a routine security audit, you identify that these laptops come with pre-installed software from the manufacturer that is not being used by the employees. What concerns should you have regarding this software from a security perspective?
The employees may use this software regularly, which could lead to potential data leaks.
The software could be useful for productivity, hence poses no significant risk.
This software may contain vulnerabilities that could be exploited by attackers because they often go unmanaged and unpatched.
This software can take up disk space, but it does not pose any security concerns.
Answer Description
Pre-installed software that is not necessary for the user's activities-commonly called bloatware-can pose a security risk if it contains unpatched vulnerabilities. Because this software is often unmanaged, it can increase the device's attack surface. Attackers may exploit flaws in the unused software or its background services even if employees never actively launch the applications. Therefore, the main concern is the presence of potentially vulnerable code, not how frequently employees use the software.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is bloatware, and why is it a security risk?
How can attackers exploit unpatched vulnerabilities in software?
What steps can companies take to mitigate risks from pre-installed software?
An attacker successfully exploits a web application vulnerability by using "../" sequences in a URL to access sensitive configuration files located outside of the web server's root directory. Which of the following attack types BEST describes this scenario?
Cross-site scripting (XSS)
Directory traversal
Privilege escalation
SQL injection (SQLi)
Answer Description
The scenario describes a directory traversal attack, also known as a path traversal attack. This attack manipulates input variables, like parts of a URL, with 'dot-dot-slash' ("../") sequences to navigate the server's file system and access files or directories outside the intended web root folder.
- SQL injection (SQLi) is an attack that targets the application's database by injecting malicious SQL code into input fields.
- Cross-site scripting (XSS) involves injecting malicious scripts into web pages viewed by other users, typically to steal session cookies or other sensitive information.
- Privilege escalation is the act of gaining elevated rights and permissions, which could be a goal or result of an attack like directory traversal, but it is not the attack method itself.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a directory traversal attack?
How does directory traversal differ from SQL injection?
What steps can developers take to prevent directory traversal attacks?
Which of the following is considered a guideline within effective security governance frameworks?
Encryption policies
Password standard
Acceptable Use Policy (AUP)
Change management procedure
Data retention guidelines
Disaster recovery policy
Answer Description
A guideline is a general rule, principle, or piece of advice that is intended to advise or guide behavior within an organization. Guidelines are not mandatory or enforceable but serve to direct consistent security practices throughout an entity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a guideline and a policy in security frameworks?
Why is data retention considered a guideline in security governance?
How do guidelines like data retention fit into overall security governance frameworks?
A security administrator is tasked with improving the employee offboarding process. Currently, the process relies on a manual checklist for disabling user accounts, which has led to several instances of delayed de-provisioning. Which of the following would be the MOST effective solution to mitigate the risk of unauthorized access by former employees?
Conduct weekly audits of active user accounts against the current employee roster.
Enforce a policy for immediate password changes upon employee termination notification.
Implement a stricter manual review process with multiple sign-offs.
Automate the de-provisioning of user accounts based on triggers from the HR system.
Answer Description
Automating the de-provisioning of user accounts based on triggers from an HR system is the most effective solution. This approach ensures that access is revoked promptly and consistently as soon as an employee's status changes in the authoritative source (the HR system), which significantly reduces the risk of human error or delays inherent in manual processes. While stricter manual reviews, immediate password changes, and periodic audits are all valid security controls, they do not address the root cause of the problem as effectively as automation. Audits are a detective control, whereas automation is a preventative control that stops the issue from occurring.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is automation more effective than manual processes in user account de-provisioning?
What role does the HR system play in automated user de-provisioning?
How do preventative controls differ from detective controls in this context?
Gnarly!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.