CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Scroll down to see your responses and detailed results
Free CompTIA Security+ SY0-701 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
As the IT manager, you are responsible for verifying the disaster recovery plan's effectiveness. You decide to run backup systems with real data and workloads to validate performance without interrupting the production environment. Which testing method should you select?
Simulation testing
Tabletop exercise
Failover testing
Parallel processing
Answer Description
The testing method described is parallel processing, where backup systems run concurrently with primary systems using real data. This allows for performance validation of backups without impacting live operations. Simulation testing involves virtual scenarios that may not use actual data. Tabletop exercises are discussion-based reviews of plans without system interaction. Failover testing switches operations to backup systems, which can interrupt the production environment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is parallel processing in the context of disaster recovery?
What are the other testing methods mentioned and how do they compare to parallel processing?
Why is it important to verify a disaster recovery plan's effectiveness?
A company is implementing multifactor authentication for their VPN access. Which of the following would be considered the BEST 'something you have' factor?
A smartphone with a biometric lock.
A security token generating one-time codes.
An SMS text message sent to the user's phone.
A password written down on a piece of paper.
Answer Description
A security token generates a pseudo-random code or has a built-in mechanism that changes the code it provides at regular intervals, which users must input for authentication. This matches the 'something you have' factor category, as it's a physical object the user must possess to gain access. SMS messages, though they can technically fall under 'something you have' since they are sent to a device you own, are not the best choice due to security concerns such as interception or SIM swapping. Passwords are 'something you know' and biometrics are 'something you are,' hence are not classified under 'something you have' for authentication factors.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the different types of authentication factors?
What is a security token and how does it work?
Why are SMS messages not considered the best choice for multifactor authentication?
Nation-state actors often engage in attacks that aim to disrupt the services of another country's critical infrastructure.
False
True
Answer Description
The correct answer is 'True'. Nation-state actors, due to their resources and motivations, commonly target critical infrastructure of other countries to cause service disruptions, which can be a part of cyber warfare or espionage activities. The incorrect option 'False' is designed to challenge the test taker's understanding of the capabilities and typical targets of nation-state actors.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are nation-state actors in cybersecurity?
What is critical infrastructure?
What are some examples of attacks on critical infrastructure?
Minor configuration adjustments to software applications do not need to be documented or reviewed through the change management process.
This statement is false; even minor configurations need to be reviewed and documented through the change management process.
This statement is true; minor configuration adjustments can be implemented directly without review through the change management process.
Answer Description
The statement is false because all changes, including minor configuration adjustments, should be documented and reviewed through the change management process. Proper documentation and review help to track changes and analyze the impacts in case of issues, maintaining accountability and enabling quick rollback if necessary. It ensures that even seemingly insignificant changes do not lead to larger problems due to unforeseen interactions with other system components.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the change management process?
Why is documentation important for minor configuration changes?
What could happen if changes are made without following the change management process?
What type of access control restricts user access to systems based on the current time?
Role-based access controls
Time-of-day restrictions
Least privilege
Attribute-based access controls
Answer Description
Time-of-day restrictions are a type of access control mechanism that limit user access to systems based on predefined time periods. This is to prevent users from accessing the system during times when they should not, such as non-business hours or during maintenance windows. This is not related to the attributes of the user (attribute-based) or their role within the organization (role-based), and it does not necessarily reflect the least privilege principle on its own. Instead, it specifies when the access is permitted, regardless of other attributes or roles.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common applications of time-of-day restrictions?
How can time-of-day restrictions be implemented in a system?
How do time-of-day restrictions differ from other access control methods?
What is a key activity performed as part of security monitoring to identify unauthorized actions within a network?
Reviewing security logs
Modifying access control lists
Deploying security patches
Installing antivirus software
Answer Description
Reviewing security logs is a key part of security monitoring. It allows security professionals to track events that have occurred within the network. Monitoring these logs helps to identify any unauthorized actions, security incidents, or policy violations. Other options listed do not directly correspond to the activity of identifying unauthorized actions through monitoring.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of security logs should be reviewed?
How often should security logs be reviewed?
What tools can assist in reviewing security logs?
A screened subnet is intended to act as an isolated network segment separating a private network from untrusted external networks.
False
True
Answer Description
The correct answer is true. A screened subnet, typically known as an area outside the internal network but inside the external firewall, is designed to host services that need to be accessible from both internal users and the public internet. By isolating this network segment, organizations create an additional security layer. Traffic between the internal network and the external networks, such as the internet, must go through this subnet, which is controlled by firewalls to ensure proper security measures are in place and direct connectivity is restricted.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a screened subnet and how does it function in network security?
What role do firewalls play in a screened subnet?
Why is isolating a network segment important for security?
An organization wants to implement a system where users authenticate once and gain access to multiple related systems without re-entering credentials. What authentication method should they deploy?
Federated Identity Management
Single Sign-On
Biometric Authentication
Multifactor Authentication
Answer Description
Single Sign-On (SSO) is the appropriate authentication method because it enables users to authenticate once and gain access to multiple applications without re-entering credentials. This streamlines the login process and enhances user experience while maintaining security. Multifactor Authentication (MFA) increases security by requiring multiple authentication factors but does not allow access to multiple systems without additional logins. Federated Identity Management allows sharing of identity information across different organizations or domains, which may not be applicable here. Biometric Authentication uses unique physical traits for identity verification but doesn't provide access to multiple systems with a single authentication.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Single Sign-On (SSO)?
How does SSO improve user experience?
What are the security considerations when using SSO?
During a scheduled change to implement a major software update, which of the following will BEST ensure that any unexpected issues can be remediated without affecting continued operations?
Scheduling an appropriate maintenance window
Identifying a clear ownership
Having a detailed backout plan
Conducting a thorough stakeholder analysis
Answer Description
A backout plan is crucial when implementing new changes, as it provides a pre-defined procedure for reverting a system back to its original state before the change in the event of a failure. This ensures minimum downtime and preserves system integrity. A maintenance window is a planned time period for changes that might affect system availability, but it doesn't in itself ensure a system can be reverted to a functional state after an unexpected issue. Ownership defines who is in charge, and stakeholder analysis identifies individuals or groups that may be affected by the change, but neither directly guarantee contingency measures for reverting implementations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What should be included in a detailed backout plan?
Why is a maintenance window important, even if it doesn’t guarantee operational continuity?
What are the key differences between ownership and stakeholder analysis in change management?
Which of the following is the BEST approach for an organization to ensure ongoing effective security compliance for international data protection regulations?
Limiting data access to a few key employees
Implementing a strong password policy across the organization
Conducting regular internal and external compliance audits
Encrypting all data stored on the organization's servers
Answer Description
Regular compliance audits are the best approach to ensure that an organization is meeting international data protection regulations. Audits provide an objective examination and provide insights into compliance status while identifying areas for improvement.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are compliance audits and why are they important for data protection?
What are some common international data protection regulations organizations should comply with?
How often should an organization conduct compliance audits?
Following the detection of aberrant behavior on a critical server that correlates with a known vulnerability alert, what immediate action should an analyst take to best mitigate the risk while preserving the ability to investigate the incident?
Configure the surveillance tools to collect more granular information for a potential forensics analysis.
Patch the server immediately with the latest updates available for the suspected vulnerability.
Isolate the server by moving it to a quarantine network.
Examine audit trails and security event log entries to identify any indicators of compromise.
Answer Description
Isolating the server by placing it in a quarantine network is the most effective immediate action to prevent the propagation of any potentially malicious activity associated with the detected behavior. This preserves the ability to conduct a forensic investigation, while patching might remove important evidence and does not stop ongoing exploitation. Reviewing security logs is an important subsequent step to gather more information about the incident but does not halt current attack vectors. Intensifying surveillance does not directly mitigate an ongoing issue and could delay critical response time.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a quarantine network?
Why is it important to preserve evidence during incident response?
What steps should follow after isolating the server?
Load balancing distributes incoming network traffic across multiple servers, while clustering primarily ensures redundancy and high availability.
False
True
Answer Description
The statement correctly differentiates load balancing and clustering. Load balancing distributes traffic to optimize resource use and performance, while clustering provides redundancy to ensure high availability.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main benefits of load balancing?
Can you explain what clustering means in the context of high availability?
How do load balancers and clusters work together in a network?
Upon discovering a data breach involving unauthorized access to the customer records system, what is the PRIMARY action the security team should focus on according to standard security protocols?
Immediately isolate affected systems to stop the spread of the breach.
Notify the company's legal team and prepare for public disclosure.
Prioritize the review of security logs to trace the origin of the attack.
Start documenting the details of the breach and response actions taken.
Answer Description
The initial focus in the event of a security breach should be to limit the damage and prevent further compromise. This is achieved by containing the threat, thereby stopping the incident from affecting additional resources. While documenting the events and notifying appropriate parties are also important, these actions occur after the immediate threat has been controlled to prevent exacerbation of the situation. Analyzing logs is part of the subsequent investigation and not the immediate concern when a breach is in progress.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is isolating affected systems the priority during a data breach?
What standard security protocols should be followed after isolating systems?
What are security logs, and why are they important in breach investigations?
When an employee leaves the organization, the employee’s data is required to be maintained for a specific period of time. In what document within the company would this requirement be specified?
Retention policy
COOP
BCP
DRP
Answer Description
The data retention policies within an organization are a set of guidelines that describes which data will be archived, how long it will be kept, what happens to the data at the end of the retention period (archive or destroy) and other factors concerning the retention of the data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a retention policy?
What are DRP, BCP, and COOP?
Why is data retention important?
A security analyst notices a series of requests on a company's web server logs. Each request tries to retrieve different paths that are not commonly accessed, and all the requests come from one external network address within a brief time window. Which of the following best describes the intent of these requests?
A misconfigured automatic task on the server
Reconnaissance by an attacker attempting to discover unlinked content or vulnerabilities
Execution of client-side scripts from a user's web browser
A user navigating the company's public website pages
Answer Description
The pattern described suggests a reconnaissance action, possibly an attacker performing a directory traversal to uncover hidden files, directories, or exploit potential vulnerabilities. Normal browsing behavior usually involves fewer requests and focuses on typical, user-facing paths. Client-side scripting refers to scripts running in a user's browser, generally not visible on server logs. A misconfigured scheduled task might repeatedly access the same path, not different uncommon ones.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is reconnaissance in the context of cybersecurity?
What is directory traversal and why is it a concern?
How can organizations detect and mitigate reconnaissance activities?
Wow!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.