CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900
00:15:00

Free CompTIA Security+ SY0-701 Practice Test

Prepare for the CompTIA Security+ SY0-701 exam with our free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • Security Operations
    • General Security Concepts
    • Threats, Vulnerabilities, and Mitigations
    • Security Architecture
    • Security Program Management and Oversight
Question 1 of 15

A company has recently decided to allow employees to access corporate email and applications on their personal smartphones. The IT department is tasked to ensure that corporate data is secure on these devices without completely restricting personal use. Which of the following MDM deployment models should be utilized?

  • Bring your own device (BYOD)

  • Corporate-owned, personally enabled (COPE)

  • Corporate-owned, business-only (COBO)

  • Choose your own device (CYOD)

Question 2 of 15

Your company issues cell phones to employees that they are authorized to use for personal use as well as business. This is an example of which mobile device policy?

  • POCE

  • CYOD

  • BYOD

  • COPE

Question 3 of 15

Which of the following best describes controls that are designed to establish security policies, procedures, and guidelines?

  • Managerial Controls

  • Technical Controls

  • Operational Controls

  • Physical Controls

Question 4 of 15

A large enterprise is seeking to enhance their system's reliability and ensure that their web application remains accessible to users, even during high traffic periods or one or more server failures. They require a solution that distributes incoming network traffic across multiple servers. Which of the following options would BEST meet their needs?

  • Load balancer

  • Failover

  • Clustering

  • Replication

Question 5 of 15

Which of the following is considered a guideline within effective security governance frameworks?

  • Change management procedure

  • Data retention guidelines

  • Disaster recovery policy

  • Acceptable Use Policy (AUP)

  • Password standard

  • Encryption policies

Question 6 of 15

When using a cloud service provider, which matrix is typically used to delineate the security responsibilities held by the customer versus the service provider?

  • Cloud Security Alliance Matrix

  • Shared Responsibility Model

  • Service Level Agreement Matrix

  • Cloud Control Matrix

Question 7 of 15

Your company's online retail system has been experiencing irregular traffic patterns which often lead to unplanned downtime, especially during peak shopping seasons. As a security professional tasked with enhancing system resilience, which of the following solutions would best ensure that the retail platform remains available and responsive under varying load conditions?

  • Implementing load balancers to distribute the traffic across multiple servers

  • Implementing redundant physical links to ensure network connectivity

  • Upgrading the system to use a single, high-performance server that can handle more requests

  • Deploying additional intrusion detection systems (IDS) and intrusion prevention systems (IPS)

  • Installing more powerful security software to identify traffic anomalies and possible DDoS attacks

Question 8 of 15

In an effort to mitigate the risk of insider threats, an organization's security team has drafted a set of guidelines that require employees to report any suspicious behavior or policy violations to the security office immediately. What type of security control are these guidelines?

  • Deterrent Control

  • Directive Control

  • Technical Control

  • Physical Control

Question 9 of 15

A company wants to reduce the amount of different login IDs and passwords their employees need to access the different company resources. What type of authentication scheme would you recommend they implement to provide that functionality?

  • SSO

  • RADIUS

  • 802.1x

  • TACACS+

Question 10 of 15

Key Escrow is required for all implementations of Public Key Infrastructure to ensure third-party access to encrypted data in case of emergencies.

  • False

  • True

Question 11 of 15

As a security architect, your company is expanding into new markets and is now subject to different regional regulations regarding data sovereignty. You need to ensure that customer data remains within legal borders according to these regulations. Which of the following methods would be the MOST effective to comply with these data sovereignty requirements?

  • Geographic restrictions

  • Tokenization

  • Hashing

  • Data masking

  • Encryption

  • Obfuscation

Question 12 of 15

Which of the following BEST describes a primary security concern for an RTOS in the context of an industrial control system?

  • Blocking port scanning and reconnaissance activities on the network.

  • Protecting against data leakage by employing full disk encryption.

  • Preventing unauthorized physical access to the system hardware.

  • Ensuring tasks are processed within a specific time frame to maintain operational continuity.

Question 13 of 15

What type of security device deployment allows network traffic to flow through it, potentially blocking or modifying packets if malicious activity is detected?

  • Inline device

  • Monitoring device

  • Tap device

  • Passive sensor

Question 14 of 15

A company's publicly accessible blog has been defaced with political slogans and messages. These unauthorized alterations have not resulted in any financial demand, data theft, or additional malfunctions within the company's IT infrastructure. Which type of threat actor is MOST likely to be responsible for this incident?

  • Unskilled attacker

  • Hacktivist

  • Organized crime

  • Insider threat

Question 15 of 15

Which protocol is primarily used to secure HTTP traffic by providing encryption, authentication, and integrity?

  • SSH

  • SSL

  • TLS

  • AES