Home 🚨 #1 REASON CANDIDATES FAIL — MASTER IT FREE

Free Security+ PBQ Library (SY0-701)
25 Realistic Performance-Based Question Labs — Exact Exam Format

PBQs appear first on the real exam, carry 2–2.5× the weight of MCQs, and cause panic in 80% of test-takers. Our labs use drag-and-drop, config forms, and partial credit — exactly like the real thing.

15
free PBQ labs
Drag/Drop
exact exam format
Partial
credit scoring
AI
instant feedback
Free
no account
Exam Tip: PBQs appear first on the real exam & carry 2–2.5× the weight. Flag hard ones, do MCQs, return. Never leave a PBQ blank — partial credit counts.
Full Mock Exam
🔥 Hard Challenge Batch — Weighted 2.5× MCQs
🔥 HARD
D3: Security Architecture 14 items

Secure AI / RAG Configuration

Configure a GenAI/RAG pipeline with safety guardrails, toggle security controls, and identify threat mitigations for prompt injection, data poisoning, and model inversion.

AI Security Prompt Injection Guardrails
🔥 HARD
D3: Security Architecture 11 items

Zero Trust Architecture

Place ZTA controls (ZTNA, micro-segmentation, CASB, PAM, continuous auth, JIT) into the correct network zones and answer trade-off questions.

Zero Trust Network Segmentation Access Control
🔥 HARD
D1: General Security Concepts 12 items

PKI & Cryptography

Build a certificate chain (Root→Intermediate→Leaf), select correct crypto algorithms for use cases, and flag certificates for revocation.

PKI Cryptography Certificate Management
🔥 HARD
D4: Security Operations 18 items

Advanced Linux Hardening

Fix a breached Linux server: repair sshd_config, configure fail2ban jail, set UFW firewall rules, and answer consequence questions about interdependent changes.

Linux Hardening fail2ban UFW Rules
🔥 HARD
D5: Security Program Management 16 items

BCDR Step Ordering & Trade-offs

Order DR recovery steps, configure RTO/RPO/backup frequency and DR site type within budget constraints, and answer BCDR trade-off questions.

BCDR RTO/RPO Disaster Recovery
🔥 HARD
D4: Security Operations 10 items

SIEM Rule & Alert Correlation

Select the correct Sigma detection rule, classify alerts to MITRE ATT&CK stages, identify the earliest containment point, and choose the correct SOAR response for a ransomware attack.

SIEM MITRE ATT&CK Incident Response
Standard PBQ Labs — Weighted 2× MCQs
D3: Security Architecture 4 items

Firewall ACL Rules

Configure firewall access control list rules to allow HTTP/HTTPS traffic and restrict database access using least privilege.

ACL configuration Implicit deny Least privilege
D3: Security Architecture 5 items

Advanced Firewall Configurator

Build a complete firewall ruleset with direction, protocol, CIDR sources, ports, and implicit deny-all policy.

Firewall rules CIDR notation Deny-all policy
D4: Security Operations 7 items

IDS/IPS Alert Analysis

Classify network security alerts as true/false positives or negatives, and select the correct Snort IPS rule action.

Alert triage Snort rules IDS vs IPS
D4: Security Operations 12 items

Incident Response Phases

Order the 6 NIST incident response phases (PICERL) and classify security actions into the correct phase.

PICERL framework Phase ordering Action classification
D4: Security Operations 4 items

Security Log Analysis

Analyze security logs from 4 hosts to identify the malware origin, infected machines, and clean workstations.

Log correlation IOC identification Attack chain analysis
D3: Security Architecture 7 items

Network Security Diagram

Place security controls (firewall, WAF, IDS, NAC, SIEM, DLP) in the correct positions within a defense-in-depth architecture.

Defense in depth Network topology Control placement
D3: Security Architecture 48 items

Subnetting Lab

Calculate subnet details (network ID, mask, first/last usable, broadcast) and assign departments using VLSM.

CIDR/VLSM Subnet calculation IP addressing
D4: Security Operations 20 items

System Hardening

Harden a Linux server: disable unnecessary services, configure SSH securely, and set PAM password policies per CIS benchmarks.

CIS Benchmarks SSH hardening PAM configuration
D3: Security Architecture 9 items

Wireless AP Configuration

Configure an enterprise wireless access point with WPA3, 802.1X/EAP-TLS authentication, and proper security toggles.

WPA3 Enterprise EAP-TLS Wireless security
Full Mock Exams Domain Practice

PBQ Strategy for the Real Exam

Skip & Return

PBQs are at the start. Mark them and answer MCQs first — then return with full confidence.

Partial Credit

You earn credit for each correct component. Never leave a PBQ blank — partial credit adds up.

Time Budget

Budget 5-10 minutes per PBQ on the real exam. Practice here to build speed.

Domain Coverage

PBQs test Domains 3 (Architecture) and 4 (Operations) most heavily — 46% of the exam.