00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

Which of the following best describes a preventive control?

  • A control that stops a security incident or attack from happening before it can cause harm.

  • A control that substitutes for a primary control when it is not feasible or practical to implement.

  • A control that directs the actions of individuals or systems to maintain security.

  • A control that identifies and responds to security incidents after they have occurred.

Question 2 of 15

Which network setup involves isolating a system from external network connections to enhance security?

  • Split tunneling

  • Software-defined network (SDN)

  • Air-gap

  • Virtual LAN (VLAN)

Question 3 of 15

Which password policy most effectively enhances security by ensuring passwords are difficult to guess or crack?

  • Allowing users to reuse their previous six passwords to simplify password management.

  • Implementing a maximum password age of 90 days to ensure regular password changes.

  • Enforcing passwords to be at least 12 characters long and include uppercase letters, lowercase letters, numbers, and special characters.

  • Encouraging users to create passwords using easily memorable phrases.

Question 4 of 15

To ensure the privacy and integrity of data as it traverses the public internet, which of the following is the BEST solution for a company connecting its remote office to the headquarters network?

  • Setting up additional access control lists at the network perimeter

  • Creating encrypted tunnels between the branch and the main office

  • Implementing an integrated cloud-based security and network solution

  • Activating private session capabilities within the company's intranet

Question 5 of 15

During a risk assessment, a security analyst needs to determine the anticipated percentage of loss that an asset would suffer if a particular vulnerability were to be exploited. Which metric should the analyst calculate to quantify this potential loss?

  • Exposure factor

  • Impact score

  • Financial loss ratio

  • Annualized loss expectancy

Question 6 of 15

A financial organization's security team has detected a significant increase in phishing attempts against its employees. In response to this threat, the team has decided to employ a mechanism that verifies the identity of email senders and checks if the emails are from trusted sources before reaching the employees. Which type of security control is the team MOST likely implementing?

  • Technical Controls

  • Operational Controls

  • Physical Controls

  • Managerial Controls

Question 7 of 15

After a recent firewall change, several users report they can reach the internal intranet site but cannot browse any external websites. You discover that HTTPS traffic is being blocked. Which firewall port must be opened so users can securely access public websites again?

  • 8080

  • 80

  • 3389

  • 443

Question 8 of 15

Which type of security control is used to stop incidents from occurring?

  • Corrective Controls

  • Preventive Controls

  • Compensating Controls

  • Detective Controls

Question 9 of 15

An organization needs to determine how frequently to back up its critical data to minimize potential data loss during system failures. Which of the following factors is the MOST important to consider when setting the backup frequency?

  • The organization's network throughput

  • The cost associated with backup media

  • The maximum acceptable data loss the business can tolerate

  • The features provided by the backup software

Question 10 of 15

An organization needs to ensure the integrity and authenticity of its software by proving the software has not been tampered with after release. Which type of certificate should be used to sign the software digitally before distribution?

  • Email certificate

  • Self-Signed certificate

  • Code Signing certificate

  • Root certificate

Question 11 of 15

During an incident response, a security analyst has identified a server that may have been compromised. The analyst decides to take an image of the server's hard drive for further analysis. Which of the following is the MOST critical step to ensure the integrity of the investigation?

  • Physically secure the server to prevent further access.

  • Limit access to the server by updating access control lists.

  • Document the process and the individuals involved in handling the server.

  • Generate a digital hash of the server's hard drive image.

Question 12 of 15

A member of the IT department received a call from an individual claiming to be from the telecommunications company that provides services to the organization. The caller requested the IT staff member to confirm sensitive configuration details about the company's PBX system to help resolve an alleged network issue. Which of the following is the BEST course of action for the IT staff member to take?

  • Share the requested information to resolve the network issue promptly as the caller seems knowledgeable about the company's telecommunications setup

  • Place the caller on a brief hold to inform a supervisor about the request and then return to share the information

  • Verify the caller's identity by calling back on a known, official number of the telecommunications company before providing any information

  • Tell the caller to send an official request for information through email and then proceed with the call

Question 13 of 15

Which operational control involves identifying, containing, and recovering from security incidents?

  • Incident response

  • Change management

  • Access controls

Question 14 of 15

An organization wants to address the risk associated with a potential financial loss from a future cyber attack. Which of the following actions exemplifies the 'Transfer' risk management strategy?

  • Developing a comprehensive incident response strategy for potential cyber attacks

  • Buying a cybersecurity insurance policy to cover costs associated with data breaches

  • Adjusting security controls to enhance detection of unauthorized access attempts

  • Conducting regular security awareness training for employees

Question 15 of 15

An organization is expanding its onsite data center infrastructure to accommodate a recent growth in remote workforce. They are concerned with the creation of a secure network architecture. In this scenario, which of the following would be the BEST solution to ensure secure remote access while minimizing the attack surface?

  • Configure a proxy server to control and filter outbound internet traffic.

  • Deploy an intrusion detection system at the network perimeter.

  • Use a jump server as the sole access point for network management.

  • Install a virtual private network (VPN) for secure remote connections.