Free — No Signup RequiredCompTIA

SY0-701 Free Practice Test — Security+

20 real exam-style questions across all 5 official blueprint domains. Answer each question to reveal the full explanation — then see exactly where to focus.

20 questions~30 minutes5 domainsPass mark: 750/1000
0 / 20
1
General Security Concepts

A security engineer writes a script that computes SHA-256 hashes of critical server configuration files every night and sends an alert if any hash value has changed since the previous night. Which security goal is this control primarily designed to protect?

Select an answer to reveal the explanation and AI Tutor

2
General Security Concepts

A financial institution updates its access control policy to require that two different system administrators must approve and execute any changes to the core transaction processing database. Which security principle is this practice primarily designed to enforce?

Select an answer to reveal the explanation and AI Tutor

3
General Security Concepts

A security architect is designing the network security posture for a new branch office. The plan includes a next-generation firewall at the perimeter, an intrusion prevention system on the internal network, mandatory multi-factor authentication for all remote access, and quarterly security awareness training for employees. The architect explains that these controls are independent of each other so that a failure in any single control does not leave the entire network unprotected. Which security concept is the architect primarily implementing?

Select an answer to reveal the explanation and AI Tutor

4
Threats, Vulnerabilities, and Mitigations

A security analyst is reviewing web server logs from an e-commerce application. The logs show repeated requests containing URLs with appended strings such as: `' OR '1'='1' --` and `'; DROP TABLE Users; --`. The application returned HTTP 200 responses with unexpected data in several instances. Which type of attack is most likely being attempted?

Select an answer to reveal the explanation and AI Tutor

5
Threats, Vulnerabilities, and Mitigations

A security analyst is reviewing the source code of a custom network service written in C. The service allocates a 256-byte buffer and uses the strcpy() function to copy incoming data into that buffer without verifying the length of the input. If an attacker sends a specially crafted payload that exceeds 256 bytes, which security control would be most effective at detecting and preventing the resulting exploitation at runtime?

Select an answer to reveal the explanation and AI Tutor

6
Threats, Vulnerabilities, and Mitigations

A CFO at a mid-sized company receives an urgent email that appears to come from the CEO's email address, requesting an immediate wire transfer of $50,000 to a new vendor for a time-sensitive project. The email address displayed is 'ceo@cornpany.com' instead of the legitimate 'ceo@company.com'. The CFO follows the instruction and initiates the transfer. Later, the real CEO denies sending such a request. Which of the following security controls would have been MOST effective in preventing this type of attack from succeeding?

Select an answer to reveal the explanation and AI Tutor

7
Threats, Vulnerabilities, and Mitigations

A user receives a phone call from someone who claims to be a member of the company's IT support team. The caller states that the user's account has been compromised and requests the user's username, password, and the current multi-factor authentication (MFA) code to 'verify identity and secure the account.' Which type of social engineering attack is being attempted?

Select an answer to reveal the explanation and AI Tutor

8
Threats, Vulnerabilities, and Mitigations

A security analyst is reviewing the source code of a custom authentication service. The service uses a function that compares a user-supplied password to the stored password hash by iterating through each byte and returning false immediately upon the first mismatch. The analyst measures the function's execution time and discovers it varies measurably depending on how many initial bytes match. Which type of attack is this vulnerability most likely to facilitate?

Select an answer to reveal the explanation and AI Tutor

9
Security Architecture

A company is redesigning its network to host a public-facing web application that accesses a confidential database. The security team needs to minimize the risk of a direct attack against the database server while still allowing the web server to retrieve and update data. Which network architecture best achieves this objective?

Select an answer to reveal the explanation and AI Tutor

10
Security Architecture

A security architect is designing a new data center network that will host public-facing web servers and internal application servers handling confidential employee data. The architect places the web servers in a DMZ and the internal application servers on a separate internal network segment. A stateful firewall is configured to allow inbound HTTP/HTTPS traffic from the internet to the web servers only. The firewall also permits only the web servers to initiate outbound connections to the internal application servers on a specific TCP port, and all such traffic is encrypted using TLS. Which security architecture principle is this design primarily intended to enforce?

Select an answer to reveal the explanation and AI Tutor

11
Security Architecture

A company's current remote access solution uses a traditional VPN that grants users full network-layer access to the internal LAN once authenticated. The security architect wants to adopt a zero trust architecture to reduce the risk of lateral movement by compromised endpoints. Which of the following implementations best aligns with zero trust principles?

Select an answer to reveal the explanation and AI Tutor

12
Security Architecture

A security architect is designing a solution to process highly sensitive financial transactions in a shared cloud environment. The architect needs to ensure that the processor and memory used to handle transaction data are isolated from the host operating system and other virtual machines, even if the hypervisor is compromised. Which technology is specifically designed to provide this level of isolation for code and data during runtime?

Select an answer to reveal the explanation and AI Tutor

13
Security Operations

A SOC analyst receives an alert from the EDR system indicating that the process 'C:\Program Files\Vendor\Updater.exe' attempted to modify the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run registry key on a user's workstation. The analyst checks the file hash and finds it matches a known legitimate software updater. Which of the following actions is most appropriate for the analyst to take?

Select an answer to reveal the explanation and AI Tutor

14
Security Operations

A SOC analyst is reviewing logs from a Windows domain controller and notices a large number of failed logon attempts (Event ID 4625) from a single source IP address within a five-minute window. The account names used are random strings such as "a1b2c3", "x9y8z7", etc. The analyst then checks the source IP and finds it is a known external address from a foreign country. Which of the following is the most appropriate next step for the analyst to take?

Select an answer to reveal the explanation and AI Tutor

15
Security Operations

A security operations analyst is tuning a SIEM correlation rule designed to detect brute-force password attacks against domain user accounts. The current rule generates an alert when a single user account has more than 10 failed logon attempts within a 5-minute window. The SOC team is overwhelmed by thousands of alerts each day, the vast majority of which are triggered by legitimate users who accidentally mistype their passwords. Which of the following modifications to the rule would most effectively reduce false positives while still detecting actual brute-force attacks?

Select an answer to reveal the explanation and AI Tutor

16
Security Operations

A security analyst is responding to a potential ransomware incident on a Windows server that is still running. The analyst needs to preserve forensic evidence for analysis. Which of the following actions should the analyst perform first, based on the order of volatility?

Select an answer to reveal the explanation and AI Tutor

17
Security Operations

A security analyst is monitoring logs from the cloud access security broker (CASB) and observes that a user account downloaded 500 GB of data from a highly sensitive SharePoint document library within a single hour. The user's historical baseline shows an average daily download of less than 10 MB. Additionally, the log shows the session originated from an IP address in a country where the company has no employees or business operations. Which of the following actions is the most appropriate for the analyst to take?

Select an answer to reveal the explanation and AI Tutor

18
Security Operations

A security analyst in the SOC is investigating a potential DNS tunneling incident. The analyst has identified a workstation that is making thousands of DNS queries to an external domain with base64-encoded subdomains. The analyst suspects that sensitive files from the workstation are being exfiltrated by encoding their contents into the subdomains of the DNS queries. Which of the following log sources will provide the most definitive evidence to confirm that the contents of a specific sensitive file are being transmitted in the DNS queries?

Select an answer to reveal the explanation and AI Tutor

19
Security Operations

A security analyst is reviewing network flow logs and notices a series of outbound connections from a single internal workstation to an external IP address on TCP port 443. The connections occur every 5 minutes, each lasting about 2 seconds, and the amount of data transferred per connection is consistently around 1 KB. The workstation's user reports no unusual activity. The analyst checks the host's EDR logs and sees no malicious processes or known indicators. Which type of activity is this pattern most consistent with?

Select an answer to reveal the explanation and AI Tutor

20
Security Program Management and Oversight

A company is evaluating a new cloud-based customer relationship management (CRM) provider. The provider’s documentation includes a SOC 2 Type II report, but the company’s compliance team specifically requires evidence that data in transit is encrypted using TLS 1.2 or higher, and data at rest is encrypted with AES-256. Which of the following actions best demonstrates that the company has performed proper due diligence in vendor risk management?

Select an answer to reveal the explanation and AI Tutor

Answer all 20 questions to see your domain score breakdown

7-day free trial · No credit card

Unlock all 0+ SY0-701 questions

AI Tutor after every question, per-domain analytics, spaced repetition, daily challenges — and every other certification on the platform.

Cancel anytime · One plan covers every certification

SY0-701 Practice Test — FAQ

Is this SY0-701 practice test really free?

Yes — all 20 questions on this page are free with no account required. For the full 0-question bank, AI Tutor, domain analytics, and spaced repetition, a JT Exams subscription starts from £9.99/month with a 7-day free trial.

How realistic are these SY0-701 practice questions?

Every question is written by CompTIA-certified engineers against the official SY0-701 exam blueprint. Questions follow the same wording style and scenario complexity as the actual exam. They are original questions — not brain dumps — so you learn the underlying concepts, not just memorised answers.

How many questions are on the actual SY0-701 exam?

The SY0-701 exam contains approximately 0 questions and must be completed within 90 minutes. The passing score is 750/1000.

What domains does the SY0-701 cover?

The SY0-701 covers 5 domains: General Security Concepts (12%), Threats, Vulnerabilities, and Mitigations (22%), Security Architecture (18%), Security Operations (28%), Security Program Management and Oversight (null%). This practice test includes questions from every domain.