00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

An employee in your organization received a call from an individual claiming to be from the IT department. The caller stated they were conducting routine security checks and needed the employee's username and password to ensure his account is secure. The caller is exceptionally polite and knowledgeable about company protocols. Which type of social engineering attack is MOST likely occurring?

  • Phishing

  • Baiting

  • Pretexting

  • Quid pro quo

Question 2 of 20

What defines the term 'reputational damage' when considering the consequences of non-compliance with security policies and regulations?

  • An ethical violation that occurs due to an organization not adhering to agreed-upon moral standards.

  • Harm to a company's prestige or esteem that can lead to a loss of customers and difficulty in attracting talent.

  • The time when company operations are not functioning, often due to system maintenance or failures.

  • A temporary loss of consumer or partner confidence in a company's products or services.

Question 3 of 20

An organization wants to enhance its vulnerability management program by integrating additional intelligence sources. Which feature of proprietary or third-party threat feeds can be most beneficial when prioritizing vulnerabilities based on the current threat landscape?

  • General security best practices that apply to most organizations.

  • Actionable intelligence that is directly relevant to the organization's environment.

  • Network traffic data unrelated to the organization's industry vertical.

  • Detailed configuration guidelines for a multitude of unrelated software products.

Question 4 of 20

Your company’s network is configured to always check authentication/authorization each time a user tries to access data. The company is using which security model?

  • Zero trust

  • Intranet

  • Extranet

  • VLAN

Question 5 of 20

Which legal principle establishes the right of individuals to request the removal of their personal information from organizational databases or records, especially in cases where the information is no longer relevant or accurate?

  • Data Sovereignty

  • Right to Be Forgotten

  • Information Custodian

  • Data Retention

Question 6 of 20

Which U.S. federal law establishes national standards that require healthcare providers, health plans, and their business associates to implement administrative, physical, and technical safeguards to protect the privacy and security of patients' protected health information (PHI)?

  • Sarbanes-Oxley Act (SOX)

  • Gramm-Leach-Bliley Act (GLBA)

  • Payment Card Industry Data Security Standard (PCI DSS)

  • Health Insurance Portability and Accountability Act (HIPAA)

Question 7 of 20

Which of the following BEST describes the main purpose of an Intrusion Detection System (IDS)?

  • It provides detailed reports of system performance for auditing purposes.

  • It blocks unauthorized access by filtering incoming network traffic.

  • It encrypts data to prevent unauthorized access during transmission.

  • It monitors network traffic for suspicious activities and alerts administrators.

Question 8 of 20

Your company has recently rolled out a new security awareness training program focused on recognizing social engineering attacks. To ensure the effectiveness of the training, what is the MOST effective method to evaluate employee understanding and application of the training content?

  • Conducting unannounced phishing simulation campaigns

  • Unannounced network scans after training completion

  • Publishing a quarterly newsletter highlighting social engineering threats

  • Including a quiz at the end of the training session

Question 9 of 20

During an authorized security assessment, the security team at XYZ Corp is tasked with identifying potential vulnerabilities without alerting the target systems. Which of the following options best describes a method that the security team should employ to gather intelligence without raising suspicion?

  • Running an automated crawler on the company's public website

  • Performing passive DNS analysis

  • Executing a full network scan to map out live hosts

  • Engaging in social engineering calls to the employees

Question 10 of 20

A country's primary power grid and water treatment facilities have experienced a series of sophisticated, coordinated cyber attacks aimed at causing widespread service disruption. Which of the following threat actors is MOST likely responsible for this type of attack?

  • Organized crime

  • Hacktivist

  • Nation-state

  • Insider threat

Question 11 of 20

Which network appliance is primarily used to balance traffic among multiple servers to enhance performance and scalability?

  • Jump server

  • Proxy server

  • Load balancer

  • Intrusion prevention system (IPS)/intrusion detection system (IDS)

Question 12 of 20

Which category of security controls is primarily responsible for configuring and managing technical devices such as firewalls and intrusion detection systems?

  • Physical controls

  • Operational controls

  • Technical controls

  • Managerial controls

Question 13 of 20

An organization implements a set of policies that outline employee responsibilities and expected behaviors regarding information security. What type of security control is this an example of?

  • Corrective control

  • Preventive control

  • Detective control

  • Directive control

Question 14 of 20

Your organization requires a solution to monitor the health and security status of its endpoints. What kind of solution would you deploy to ensure centralized management and real-time alerting for potential security issues?

  • Set up a network analyzer to capture and inspect all traffic in and out of the network.

  • Deploy an agent-based monitoring tool on all endpoints that reports back to a central management console.

  • Regularly schedule manual security audits of all endpoints to check for software updates and configuration issues.

  • Use a centralized log management platform to passively analyze system logs.

Question 15 of 20

Which international framework should a multinational corporation adopt to ensure compliance with global data protection and privacy standards?

  • United Nations Convention on Contracts for the International Sale of Goods

  • Shipping Port Security Act

  • General Data Protection Regulation

  • Federal Information Security Management Act

Question 16 of 20

A multinational company has recently launched a cloud service platform and is considering introducing a bug bounty program to enhance its security measures. What is the most important reason for the company to integrate a bug bounty program into its vulnerability management process?

  • To promote the company's dedication to transparency and foster trust among its user base.

  • To ensure the company's compliance with international cybersecurity regulations and standards.

  • To focus specifically on mitigating zero-day exploits by having them reported through the program.

  • To uncover otherwise undetected vulnerabilities by leveraging the collective efforts of the global security research community.

Question 17 of 20

A large enterprise with critical uptime requirements needs to implement a feature in their file system to help maintain a consistent state of their files post any system crashes. Which of the following would BEST ensure that file changes are systematically recorded, facilitating a quick restoration of the last known good state after a crash?

  • Relying on routine snapshots of the data

  • Implementing a file system with journaling capabilities

  • Enforcing strict file permissions

  • Utilizing RAID configurations for data redundancy

Question 18 of 20

Which social engineering attack is most effectively combated by implementing strong organizational verification procedures and training employees to confirm requests through multi-channel verifications?

  • Shadow IT

  • Phishing

  • Business Email Compromise (BEC)

  • Piggybacking

Question 19 of 20

Malicious activity has been affecting various systems on your network. You want to put a system in place that can monitor network traffic and attempt to take defensive action when network intrusions are detected. Which of the following should you use?

  • NIPS

  • HIDS

  • HIPS

  • NIDS

Question 20 of 20

An organization has implemented a security guard at the entrance to its data center to verify identity badges before allowing entrance. Which type of security control does this represent?

  • Corrective Control

  • Preventive Control

  • Deterrent Control

  • Detective Control