00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

What process converts plaintext into a coded format to prevent unauthorized access?

  • Encryption

  • Hashing

  • Obfuscation

  • Tokenization

Question 2 of 15

When managing vulnerabilities within an organization's infrastructure, which criteria should be considered MOST important for prioritization?

  • Popularity of the software with vulnerabilities

  • Potential impact on business operations

  • Security team's personal preference

  • Ease of implementation for the fix

Question 3 of 15

A large financial institution is preparing to revise its security protocols to enhance the protection of client data. The institution has multiple international offices and must comply with various regional encryption standards. Which of the following should be the primary consideration when updating the company-wide encryption standard?

  • Adopt the strictest regional encryption standard as the company-wide standard to ensure compliance across all locations.

  • Develop a new encryption standard internally that is different from all regional standards but meets the minimum required security level.

  • Follow only the regional encryption standards of the country where the financial institution's headquarters is located.

  • Implement the least strict regional encryption standard to minimize complications in international operations.

Question 4 of 15

When updating security policies after a software upgrade, which of the following is the BEST method to ensure the policies are correctly understood and enforced across the organization?

  • Mandating immediate adherence to the updated policies without a review process.

  • Conducting an approval process involving key stakeholders to review and accept the updated policies.

  • Informing only the security team about the updated policies and assuming other departments will follow suit.

  • Requiring the IT department to implement the updated policies without obtaining consensus from other departments.

Question 5 of 15

Allow lists are a security measure that permits only approved entities to access resources.

  • True

  • False

Question 6 of 15

Snapshots capture the state of a system at a specific point in time for backup purposes.

  • True

  • False

Question 7 of 15

During a security incident, after initial detection and analysis, an IT security analyst is determining which course of action to take to limit the damage and prevent extended downtime. Out of the following options, which should be prioritized?

  • Containment

  • Lessons learned

  • Eradication

  • Recovery

Question 8 of 15

A company is assessing various options to enhance the security of their facility and data center. Which of the following would serve as the best deterrent control to discourage trespassers from entering the secured premises of the data center?

  • Deploying mantraps at the primary entrance to the data center

  • Installing highly visible security cameras around the perimeter and entry points

  • Erecting security awareness posters regarding tailgating in employee areas

  • Implementing badge readers at all points of entrance and exit

Question 9 of 15

In the context of cybersecurity, what is a primary security concern when dealing with suppliers?

  • Data corruption during transmission

  • Unauthorized data sharing

  • Inadequate customer service

  • Compromised hardware or software

Question 10 of 15

Your employer has a large team of software developers with constantly changing codebases for dozens of internal applications. As a part of change control any code changes go through an automated vulnerability scanning process which checks for known vulnerabilities in frameworks, programming languages, dependencies and the code itself. Due to business pressure these scans have been largely ignored and there are currently over a thousand issues found by the automated scanning. You are tasked with working with the developers and remedying 100% of the issues. What should you do next?

  • Stop all deployments, code changes and updates until the vulnerabilities are fixed

  • Identify any false positives to reduce the number of items to remediate

  • Organize the vulnerabilities by criticality and begin planning for solutions for the most critical vulnerabilities first

  • Implement an approval step for all code changes that requires no security issues prior to updates

Question 11 of 15

An employee in your organization received a call from an individual claiming to be from the IT department. The caller stated they were conducting routine security checks and needed the employee's username and password to ensure his account is secure. The caller is exceptionally polite and knowledgeable about company protocols. Which type of social engineering attack is MOST likely occurring?

  • Phishing

  • Pretexting

  • Baiting

  • Quid pro quo

Question 12 of 15

Process hollowing is a technique where an attacker can insert malicious code into the address space of a running process.

  • The statement is false

  • The statement is true

Question 13 of 15

You have joined a new enterprise as a member of the IT Security team. During on boarding you receive two computers, one with access to highly confidential systems and one with access to less critical data and the internet. You cannot send data or documents from one network to the other and have to manage separate credentials for each. What concept best defines this approach?

  • Data aggregated network segmentation (DANS)

  • Air gap

  • Physical de-segmentation

  • VPN

Question 14 of 15

Which of the following types of tests best describes a scenario where participants walk through the steps of various disaster recovery procedures without actually performing any recovery operations?

  • Tabletop exercise

  • Simulation

  • Failover

  • Parallel processing

Question 15 of 15

Which of the following is a system designed to attract and trap potential attackers, allowing cybersecurity professionals to study their methods and techniques?

  • Honeypot

  • Virtual Private Network (VPN)

  • Intrusion Detection System (IDS)

  • Firewall