00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight

Free Preview

This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!

Question 1 of 15

During an audit as a third party security consultant you are told that the organization being audited conducts an exercise annually during which prominent IT staff and the security team gather in a meeting room and discuss how they would handle various security incidents and disaster scenarios. This exercise is then used to update any policies and playbooks. What type of exercise are they describing?

  • Incident Response Planning (IRP)

  • Dungeons and Dragons (DND)

  • DR Planning

  • Business Impact Exercise (BIE)

  • Tabletop Exercise

Question 2 of 15

What term describes a collection of common attributes that are used to categorize and compare vulnerabilities?

  • Vulnerability classification

  • Vulnerability indexing

  • Vulnerability enumeration

  • Vulnerability scoring

Question 3 of 15

Which of the given options is a hashing algorithm that creates a 128 bit fixed output?

  • SHA2

  • SHA1

  • MD5

  • RIP128

Question 4 of 15

A financial institution is implementing a policy that allows employees to use their personal smartphones for work-related tasks. The institution wants to ensure that company-specific information and configurations can be remotely removed from these smartphones when an employee terminates employment, while preserving the employee's personal data and apps. Which feature should the company look for in a software solution that allows for the central management of mobile devices?

  • Remote locking

  • Full wipe

  • Selective wipe

  • Encryption

Question 5 of 15

When using a cloud service provider, which matrix is typically used to delineate the security responsibilities held by the customer versus the service provider?

  • Shared Responsibility Model

  • Cloud Control Matrix

  • Cloud Security Alliance Matrix

  • Service Level Agreement Matrix

Question 6 of 15

A company's security team is implementing various encryption strategies to protect the organization's data at rest. If they need to ensure the confidentiality of entire drives on employees' laptops which could be easily stolen or lost, which encryption method would be most appropriate?

  • Database encryption

  • Full-disk encryption

  • File encryption

  • Partition encryption

Question 7 of 15

A company requires a solution to securely generate, store, and manage cryptographic keys for their data encryption needs. This solution must be resistant to tampering and capable of integrating with existing hardware to provide secure boot, disk encryption, and digital rights management services. Which of the following options represents the BEST tool for this requirement?

  • Secure Enclave

  • Hardware Security Module (HSM)

  • Trusted Platform Module (TPM)

  • Key Management System

Question 8 of 15

Your organization is in the process of selecting a new vendor for cloud storage services. As part of this process, what should be conducted to evaluate and address the risks associated with the potential vendor prior to formalizing an agreement?

  • Due Diligence

  • Vendor risk assessment

  • Business Impact Analysis

  • Right-to-Audit Clause

Question 9 of 15

You are taking a walk around the neighborhood. You see a sign in one of your neighbor’s unfenced yards that reads “No trespassing!” in large red letters. The sign is what type of control?

  • Preventive

  • Compensating

  • Corrective

  • Deterrent

  • Detective

Question 10 of 15

You are working as a cybersecurity analyst for a 3rd party contractor. You have been brought in by an organization who believes they were hacked by a malicious actor. Their internal security team has hired you to determine the impact of the unauthorized access. At the time of the intrusion there were 5 servers online: DEV_APP_001, PRD_APP_002, PRD_DB_008, STG_DB_004 and FINANCE_009. What step should you take to begin the analysis?

  • Create a snapshot backup and then reformat each server

  • Begin hardening all servers immediately before the impact analysis starts

  • Begin analyzing each server after prioritizing them based on the data stored on each server

  • Create a new server running Kali Linux and make necessary firewall changes to allow it to access all the listed servers

Question 11 of 15

Which of the following is a physical control designed to allow visibility and detection of unauthorized entry while limiting the potential of physical confrontations?

  • Mantrap

  • Bollards

  • Surveillance cameras

  • Keypad door locks

Question 12 of 15

During a recent audit of security logs, an analyst discovers that certain log entries are sporadically missing over the past month. Understanding the importance of logs for detecting and troubleshooting anomalies, which of the following is the BEST explanation for the missing logs?

  • Time synchronization issues between servers

  • Scheduled maintenance activities

  • Log rotation configured without proper archiving

  • Log tampering by an unauthorized party

Question 13 of 15

During an audit it is identified that a host being used for FTP has additional unused ports open. The server is listening on 21, 20, 43, 80 and 3389. Your boss has tasked you to close the unused ports. Which ports should remain open?

  • 80

  • 43, 80

  • 20, 21

  • 43

  • 3389

  • 20, 3389

Question 14 of 15

You are a security analyst and have networking monitoring solutions in place to detect strange or potentially malicious traffic. One of these solutions has sent an alert saying it detected outgoing network traffic from the company's network that was routing to a well-known malicious endpoint. Of the following options which is the most likely to be the cause of this traffic?

  • A colleague on your team is conducting a pentest

  • A hacker is probing the company network from the outside

  • A user has attached confidential materials to an outgoing email

  • An infected server or user machine is attempting to contact a command-and-control server

Question 15 of 15

Responsibility for maintaining the security of the application layer in a cloud environment is always with the cloud service provider.

  • True

  • False