00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

Your company is engaging with a new vendor that will provide a critical component for your product's manufacturing process. As part of the vendor selection process, you are tasked with performing a supply chain analysis. Which of the following actions is most essential to mitigate the risks associated with this new integration?

  • Check references from other companies that have worked with the vendor.

  • Verify the financial stability of the vendor.

  • Perform an on-site security assessment of the vendor's facilities.

  • Review the vendor's security and compliance certifications.

Question 2 of 20

A company wants to reduce the number of login IDs and passwords their employees need to remember to access various company resources. Which authentication scheme should a security administrator recommend to achieve this?

  • SSO

  • RADIUS

  • 802.1X

  • TACACS+

Question 3 of 20

Which security control type is exemplified by organizational security policies and guidelines that direct the behavior of users and systems toward compliance?

  • Directive control

  • Preventive control

  • Corrective control

  • Detective control

Question 4 of 20

After a security breach that resulted in data loss, which of the following is the BEST step to restore the affected systems to their operational state?

  • Use verified backups to restore affected systems

  • Wipe the drives and perform system replication from a similar environment

  • Re-image affected systems with the latest system images

  • Apply the latest security patches to affected systems

Question 5 of 20

Which of the following best exemplifies a technical control?

  • Installing firewall software on a network server

  • Establishing a policy requiring badge access to enter the facility

  • Deploying security awareness training for employees

  • Performing background checks on new hires

Question 6 of 20

Who is typically referred to as the individual whose personal data is processed by a controller or processor in a security compliance context?

  • Data Controller

  • Data Custodian

  • Data Processor

  • Data Subject

Question 7 of 20

A development team is building a CI/CD pipeline that must deploy the same build of an application to developers' laptops, an on-premises test cluster, and multiple public cloud providers. They need a lightweight, portable mechanism that bundles the application together with all required libraries so it runs identically everywhere. Which technology satisfies this requirement?

  • Containerization

  • Virtualization

  • Serverless computing

  • Microservices

Question 8 of 20

Which hardware-based security solution is specifically designed to securely generate, store, and manage cryptographic keys for a wide variety of applications?

  • HSM

  • TPM

  • Secure Enclave

  • Key Management System

Question 9 of 20

A company is reviewing their security controls for critical infrastructure and needs to decide on the deployment of a mechanism that should ensure maximum uptime. However, during a network outage or a device failure, they want the mechanism to prioritize network availability over strict security to maintain business operations. Which of the following configurations would BEST align with the company's requirements?

  • Implement a fail-open mechanism on security devices.

  • Deploy an additional layer of intrusion prevention systems.

  • Set all security devices to a fail-close setting.

  • Configure a high availability cluster for all critical systems.

Question 10 of 20

You have ordered a penetration test on the company's website from a third-party IT security consultant. Your web administration team has created a stand-alone test network to ensure the penetration test does not cause issues on the live website. Other than the IP address of the web server, you have not provided the penetration testers with any other information. What type of test best describes this scenario?

  • Stand-alone

  • White-box

  • Integration

  • Black-box

Question 11 of 20

Which type of security control is primarily designed to discourage potential attackers from attempting to breach an organization's defenses?

  • Preventive controls

  • Detective controls

  • Corrective controls

  • Deterrent controls

Question 12 of 20

A security administrator is creating a document that provides non-mandatory recommendations and best practices for employees on how to securely handle sensitive company data. Which of the following control documents is the administrator creating?

  • Procedure

  • Policy

  • Standard

  • Guideline

Question 13 of 20

When configuring a network appliance to view traffic without altering it, which device attribute should it have?

  • Tap/Monitor in active mode

  • Inline

  • Active

  • Passive

Question 14 of 20

Which term best describes an organization’s decision to undertake risks that offer a reasonable balance between potential benefits and potential harm, without significantly swaying towards either risk aversion or risk seeking?

  • Risk Mitigation

  • Conservative

  • Expansionary

  • Neutral

Question 15 of 20

As a Security Manager in charge of security awareness, you are designing a new training module to educate employees on identifying and handling security incidents. What key element should you prioritize to ensure that the module effectively enhances the employees' ability to act correctly in the event of an actual incident?

  • Incorporate practical, real-life scenarios that employees might encounter.

  • Keep the training as brief as possible to avoid taking up too much of the employees' time.

  • Focus primarily on the consequences and punishments for failing to adhere to security policies.

  • Emphasize the use of complex technical jargon to demonstrate the seriousness of security concepts.

Question 16 of 20

During an investigation, which method ensures that the evidence collected remains admissible in court by documenting the control, transfer, analysis, and disposition of the digital evidence from the time of acquisition?

  • Legal hold

  • Acquisition

  • Chain of custody

  • Reporting

Question 17 of 20

A security analyst is developing documentation to standardize the response process for common security incidents. This documentation will outline specific steps, actions, and decision points for handling events like phishing attacks and malware infections. Which of the following is being created?

  • A risk register

  • A playbook

  • An Acceptable Use Policy (AUP)

  • A Business Impact Analysis (BIA)

Question 18 of 20

A systems administrator observes that every Friday afternoon, right after the stock market closes, a series of unauthorized transactions and excessive resource utilization occurs on a finance company's trading application server. What type of malware is most likely responsible for this recurring incident?

  • Worm

  • Trojan

  • Spyware

  • Logic bomb

Question 19 of 20

Which statement about creating heat maps during a wireless site survey is TRUE?

  • Heat maps are necessary only for outdoor deployments, not for indoor wireless networks.

  • Heat maps are produced automatically by the wireless controller only after clients connect to the network.

  • Predictive modeling can generate accurate heat maps before the physical environment is fully built.

  • Heat maps can only be created after access points are installed and on-site signal readings are taken.

Question 20 of 20

Which of the following is a potential risk when relying heavily on automation for security operations?

  • Improved reaction time

  • Single point of failure

  • Automatic enforcement of configuration baselines

  • Standardized infrastructure configurations