00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-90 questions and set a time limit.

Logo for CompTIA Security+ SY0-701
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Objectives:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

Establishing a dedicated committee to oversee the development and enforcement of information security policies, standards, and procedures is unnecessary if the organization already has a skilled IT department.

  • True

  • False

Question 2 of 15

During a routine audit, your security team has discovered an unauthorized active directory tool being used by the marketing department to synchronize contact information across platforms. The team suspects that this is a case of Shadow IT. What is the PRIMARY risk associated with this discovery?

  • Increased IT budget due to additional user licenses required for the unauthorized tool

  • Security breaches due to unauthorized applications bypassing organizational security processes

  • Decreased usage of IT-approved communication tools

  • Increased productivity and efficiency within the marketing department

Question 3 of 15

A medium-sized enterprise has decided to implement a comprehensive disaster recovery plan. Given the critical nature of their transactional database that receives updates nearly every minute, which of the following backup frequencies would best balance the need for up-to-date data restoration capabilities with resource utilization?

  • Incremental backups every 2 hours with daily full backups

  • Full backups every 24 hours only

  • Differential backups every 4 hours without scheduled full backups

  • Full backups at the end of every week

Question 4 of 15

Biometrics is an example of which multi-factor authentication factor?

  • Something you have

  • Somewhere you are

  • Something you know

  • Something you are

Question 5 of 15

All organizations operating within a country are subject to that nation's information security laws and regulations, regardless of the organization's country of origin or the location of its headquarters.

  • True

  • False

Question 6 of 15

Which of the following BEST describes the main purpose of an Intrusion Detection System (IDS)?

  • It monitors network traffic for suspicious activities and alerts administrators.

  • It encrypts data to prevent unauthorized access during transmission.

  • It provides detailed reports of system performance for auditing purposes.

  • It blocks unauthorized access by filtering incoming network traffic.

Question 7 of 15

An insider threat is more likely to be driven by revenge than by philosophical or political beliefs.

  • False

  • True

Question 8 of 15

Your employer has a large team of software developers with constantly changing codebases for dozens of internal applications. As a part of change control any code changes go through an automated vulnerability scanning process which checks for known vulnerabilities in frameworks, programming languages, dependencies and the code itself. Due to business pressure these scans have been largely ignored and there are currently over a thousand issues found by the automated scanning. You are tasked with working with the developers and remedying 100% of the issues. What should you do next?

  • Stop all deployments, code changes and updates until the vulnerabilities are fixed

  • Organize the vulnerabilities by criticality and begin planning for solutions for the most critical vulnerabilities first

  • Identify any false positives to reduce the number of items to remediate

  • Implement an approval step for all code changes that requires no security issues prior to updates

Question 9 of 15

A company is looking to assign the responsibility of implementing encryption on sensitive data as required by the Information Security Policy. Who should be designated to ensure that the technical controls are configured in accordance with the policy requirements?

  • Data Custodian/Steward

  • Data Controller

  • Data Owner

  • Auditor

Question 10 of 15

Your organization is handling sensitive government contracts and must ensure that information related to these projects is guarded against unauthorized physical access. In accordance with data classification policies, which of the following is the BEST way to handle such data?

  • Store the data in a physically secure location and enforce strict access controls

  • Institute policies for secure disposal of printouts and storage media containing the data

  • Encrypt all data and frequently change encryption keys

  • Enable detailed logging of all access to the data for audit purposes

Question 11 of 15

When configuring a security device to ensure that, in the event of a failure, it will maintain a state that prevents traffic from passing through it, which mode should be used?

  • Fail-safe

  • Fail-open

  • Fail-closed

  • Fail-secure

Question 12 of 15

Which of the following best describes the primary purpose of directive controls in a security context?

  • To detect and respond to security incidents after they occur

  • To implement and manage security technologies

  • To discourage potential attackers from targeting the organization

  • To provide guidance and instructions on maintaining security

Question 13 of 15

What is the primary function of antivirus software on a computer system?

  • To encrypt the data and information on the computer system to prevent unauthorized access.

  • To provide regular backups of the user's data stored on the computer system.

  • To enhance the performance and speed of the computer system by managing its resources.

  • To detect, prevent, and remove malware from the computer system.

Question 14 of 15

What type of power supply can provide instant protection from power interruptions by supplying energy stored in batteries during an outage?

  • Voltage regulator

  • Power strip

  • Surge protector

  • Uninterruptible power supply (UPS)

Question 15 of 15

An organization is developing a disaster recovery plan and wants a backup site that has hardware and network connectivity already set up, but where data synchronization and configuration would be necessary before resuming operations. Which type of site does this describe?

  • Mobile site

  • Warm site

  • Cold site

  • Hot site