00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

CompTIA Security+ SY0-701 (V7) Logo
  • Free CompTIA Security+ SY0-701 (V7) Practice Test

  • 20 Questions
  • Unlimited
  • General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight

Free Preview

This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!

Question 1 of 20

A security administrator at a small warehouse needs a control that allows staff to monitor and record any unauthorized after-hours entry so they can alert law enforcement rather than physically confronting intruders. Which physical control would BEST meet this requirement?

  • Bollards

  • Mantrap

  • Surveillance cameras

  • Keypad door locks

Question 2 of 20

A company requires a solution to securely generate, store, and manage cryptographic keys for their data encryption needs. This solution must be resistant to tampering and capable of integrating with existing hardware to provide secure boot, disk encryption, and digital rights management services. Which of the following options represents the BEST tool for this requirement?

  • Secure Enclave

  • Trusted Platform Module (TPM)

  • Key Management System

  • Hardware Security Module (HSM)

Question 3 of 20

A software development company wants to allow its users to log into a third-party code repository from their in-house development platform. The company aims to facilitate this without sharing user credentials with the third-party service. Which protocol is best suited to allow the company's platform to request access to the third-party service on behalf of the user?

  • Terminal Access Controller Access-Control System Plus (TACACS+)

  • Remote Authentication Dial-In User Service (RADIUS)

  • Lightweight Directory Access Protocol (LDAP)

  • Open Authorization (OAuth)

Question 4 of 20

You are taking a walk around the neighborhood. You see a sign in one of your neighbor’s unfenced yards that reads “No trespassing!” in large red letters. The sign is what type of control?

  • Compensating

  • Corrective

  • Detective

  • Deterrent

  • Preventive

Question 5 of 20

Which of the following statements BEST describes who is responsible for securing the application layer (for example, patching application code and mitigating application-level vulnerabilities) under the cloud shared-responsibility model?

  • In IaaS the provider secures applications, whereas in SaaS the customer does.

  • The cloud service provider is always responsible, no matter which service model is used.

  • The customer is always responsible, regardless of the service model.

  • Responsibility shifts by service model: customers secure the application layer in IaaS (and generally in PaaS), but the provider secures it in SaaS.

Question 6 of 20

A company is reviewing its disaster recovery plan to ensure that the amount of data loss in the event of a disaster does not exceed business operational tolerances. Which metric should be assessed to determine the optimal frequency of data backups?

  • Recovery Time Objective (RTO)

  • Annualized Loss Expectancy (ALE)

  • Single Loss Expectancy (SLE)

  • Recovery Point Objective (RPO)

Question 7 of 20

An administrator is redesigning a campus network and wants to reduce the likelihood of collisions on each segment while also minimizing the number of devices that receive every broadcast frame. Which network device should be deployed and configured with VLANs to meet both goals?

  • Router

  • Layer 2 switch

  • Wireless access point

  • Hub

Question 8 of 20

What does the term 'resource provisioning' refer to in the context of securing computing resources?

  • The act of installing antivirus software on workstations and servers

  • The step-by-step methodology of responding to security incidents

  • The process of allocating and managing computing resources to users or systems according to security policies

  • The storage and classification of organizational data in accordance with established compliance requirements

Question 9 of 20

A company is revising its security monitoring strategies to enhance incident detection and response. Their current system is primarily manual, resulting in delayed identification and inconsistent reporting of suspicious activities. Which of the following is the BEST method to improve their incident reporting and monitoring process?

  • Increasing the frequency of manual security audits

  • Conducting more comprehensive employee training sessions

  • Implementing real-time automated monitoring and alerting systems

  • Expanding the in-house security team

Question 10 of 20

As a third-party security consultant auditing an organization, you learn that their security team and key IT staff meet annually. In these meetings, they discuss their responses to various security incidents and disaster scenarios to refine policies and playbooks. This exercise is entirely discussion-based and does not involve live systems. What type of incident response exercise does this describe?

  • Incident Response Planning (IRP)

  • Tabletop exercise

  • Disaster Recovery Planning (DRP)

  • Simulation

Question 11 of 20

A company is migrating its application servers to an Infrastructure as a Service (IaaS) cloud provider. The IT team is debating who is responsible for applying security patches to the guest operating systems on the virtual machines. Which cloud computing concept should they consult to clarify this division of duties?

  • Shared Responsibility Model

  • Cloud Security Alliance Matrix

  • Service Level Agreement Matrix

  • Cloud Control Matrix

Question 12 of 20

A security analyst is reviewing the source code of a legacy application and discovers a function that is used to hash user passwords before storing them. The function consistently produces a 128-bit hash value. The organization's security policy requires migrating away from any algorithms known to be weak or deprecated. Which of the following hashing algorithms was most likely used in this legacy application?

  • SHA-1

  • RIPEMD-160

  • SHA-256

  • MD5

Question 13 of 20

A security analyst is reviewing a report from a recent vulnerability scan that identified over 200 issues across various systems, including web servers, databases, and network switches. To manage the remediation process effectively, the analyst groups the vulnerabilities based on common characteristics, such as the type of weakness (e.g., SQL injection, cross-site scripting) and the affected technology stack. What is this process of categorizing vulnerabilities called?

  • Vulnerability classification

  • Vulnerability scoring

  • Vulnerability indexing

  • Vulnerability enumeration

Question 14 of 20

You are a security analyst and have networking monitoring solutions in place to detect strange or potentially malicious traffic. One of these solutions has sent an alert saying it detected outgoing network traffic from the company's network that was routing to a well-known malicious endpoint. Of the following options which is the most likely to be the cause of this traffic?

  • A user has attached confidential materials to an outgoing email

  • A colleague on your team is conducting a pentest

  • A hacker is probing the company network from the outside

  • An infected server or user machine is attempting to contact a command-and-control server

Question 15 of 20

A financial institution is implementing a policy that allows employees to use their personal smartphones for work-related tasks. The institution wants to ensure that company-specific information and configurations can be remotely removed from these smartphones when an employee terminates employment, while preserving the employee's personal data and apps. Which feature should the company look for in a software solution that allows for the central management of mobile devices?

  • Selective wipe

  • Remote locking

  • Full wipe

  • Encryption

Question 16 of 20

A company deploys an AAA server to centralize access control. After users have successfully authenticated, the server consults its policy database to decide which file shares, VLANs, and applications each user can reach. Which AAA function is being performed at this point?

  • Non-repudiation

  • Authentication

  • Accounting

  • Authorization

Question 17 of 20

During a recent audit of security logs, an analyst discovers that certain log entries are sporadically missing over the past month. Understanding the importance of logs for detecting and troubleshooting anomalies, which of the following is the BEST explanation for the missing logs?

  • Time synchronization issues between servers

  • Log tampering by an unauthorized party

  • Scheduled maintenance activities

  • Log rotation configured without proper archiving

Question 18 of 20

Your organization is in the process of selecting a new vendor for cloud storage services. As part of this process, what should be conducted to evaluate and address the risks associated with the potential vendor prior to formalizing an agreement?

  • Vendor risk assessment

  • Business Impact Analysis

  • Right-to-Audit Clause

  • Due Diligence

Question 19 of 20

During an audit it is identified that a host providing FTP services has several additional ports open. The server is currently listening on 21, 20, 43, 80, and 3389. Your manager asks you to close any ports that are not required for FTP functionality. Which port or ports should remain open?

  • 20 and 21

  • 21 only

  • 20 and 3389

  • 43 and 80

Question 20 of 20

In a highly secure network environment with strict throughput requirements, which device attribute would MOST likely be preferred when implementing a security control intended to scrutinize traffic without causing significant latency?

  • An active security device configured to make real-time decisions

  • An inline security device configured to interact with traffic

  • A security device configured to fail-open to reduce latency

  • A tap/monitor setup that passively observes traffic