00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

An organization is considering updating their wide area network architecture to improve the management of security policies and the application of security updates across the network. What is the PRIMARY security benefit of transitioning to a Software-Defined Wide Area Network?

  • Centralized management of security policies and updates

  • Reduction in operational costs by utilizing virtualization

  • Optimized performance through application-aware routing

  • Dynamic path selection for bandwidth optimization

Question 2 of 20

A network administrator needs to devise a strategy to optimize resource utilization when web-traffic spikes unpredictably, while also avoiding a single point of failure in the web-service infrastructure. Which configuration best meets these business requirements?

  • Introduce a load balancer to distribute the traffic

  • Create a server cluster for redundancy

  • Deploy a reverse proxy to manage web requests

  • Implement RAID configurations for all web servers

Question 3 of 20

A company's security team has recently upgraded the network firewall to a newer model to enhance security features. As a security analyst, what is the MOST important action to perform following the upgrade to ensure ongoing operational efficiency?

  • Implement additional firewall rules to immediately increase the security posture without a scheduled review.

  • Update the security policies and network configuration documentation to reflect changes made by the new firewall.

  • Schedule a meeting with the stakeholders to discuss the possibility of future upgrades.

  • Perform a complete network penetration test to identify potential new vulnerabilities introduced.

Question 4 of 20

A security administrator is tasked with selecting an authentication framework that can be deployed on both a new WPA3-Enterprise Wi-Fi network and several legacy PPP dial-up links. The solution must allow the company to swap among smart-card logons, one-time passwords, or certificate-based credentials without changing the underlying transport. Which authentication framework satisfies these requirements?

  • Kerberos

  • Protected Extensible Authentication Protocol (PEAP)

  • Extensible Authentication Protocol (EAP)

  • Remote Authentication Dial-In User Service (RADIUS)

Question 5 of 20

Your organization has entered into an agreement with a third-party vendor for cloud storage services. As part of the due-diligence process, it is important to assess the security responsibilities assigned to the vendor. Which document should you review to understand the security tasks that the vendor is obligated to perform?

  • Network topology diagram

  • Incident report

  • Responsibility matrix

  • Vendor's security policy documents

Question 6 of 20

Which type of sensor is typically utilized to detect motion through emitted microwave signals that reflect off moving objects?

  • Infrared sensor

  • Ultrasonic sensor

  • Microwave sensor

  • Pressure sensor

Question 7 of 20

You are conducting a penetration test on a web application recently purchased by the HR department of your employer. You find that when creating a new user account in the Web UI you can delete data from the database by entering '; DROP TABLE Users' into the field for the user account. What type of vulnerability have you discovered?

  • SQL injection

  • Request forgery

  • XML Injection

  • Drop database vulnerability

Question 8 of 20

What is the primary purpose of implementing automation in vulnerability management processes?

  • To eliminate the necessity of establishing secure baselines for systems.

  • To ensure manual processes are the primary method for vulnerability detection.

  • To increase efficiency and consistency in vulnerability detection and response.

  • To completely eliminate user error in vulnerability management.

Question 9 of 20

A security administrator at a mid-size company is selecting an algorithm for secure email encryption that relies on a public/private key pair rather than a shared secret, to implement digital signatures as well. Which of the following algorithms satisfies this requirement?

  • Blowfish

  • AES

  • RSA

  • RC4

Question 10 of 20

Which of the following best describes how an access control list (ACL) can be applied on a router interface to control packet flow?

  • It can be applied in either direction, but once applied you cannot have both an inbound and an outbound ACL on the same interface.

  • It can only be applied in the outbound direction and filters traffic leaving the router.

  • It can be applied inbound and/or outbound on the same interface, allowing filtering of packets entering or leaving the interface according to defined rules.

  • It can only be applied in the inbound direction and filters traffic entering the router.

Question 11 of 20

Which of the following security functions is provided by DomainKeys Identified Mail (DKIM)?

  • It encrypts the entire email message during transit to ensure confidentiality.

  • It verifies that the message body and attachments have not been altered since the sender signed the message.

  • It blocks email from unauthorized IP addresses by checking the envelope sender against an allow list.

  • It enforces domain-level policies instructing receivers how to handle failed SPF and DKIM checks.

Question 12 of 20

Deciding not to apply a software patch to a non-critical system immediately because the patch may disrupt operations can be indicative of an organization's risk tolerance.

  • False

  • True

Question 13 of 20

Which physical security measure is designed to prevent unauthorized access by controlling the entry and exit of individuals through the use of two interlocking doors?

  • Turnstile

  • Security Camera

  • Bollard

  • Access Control Vestibule

Question 14 of 20

When managing operations across multiple countries, each with their own unique privacy and data handling laws, what is the BEST approach a company can adopt to ensure ongoing compliance in its handling of personal customer data?

  • Adopting a comprehensive data inventory and retention policy

  • Establishing generic organizational policies for data handling

  • Enhancing employee awareness through training programs

  • Regularly engaging with third-party auditors for compliance checks

Question 15 of 20

A company wants to minimize the exposure of sensitive customer credit card data within its e-commerce environment. Which of the following data protection strategies would BEST reduce the risk of credit card data breaches while maintaining the ability to perform transactional operations?

  • Geolocation

  • Encryption

  • Masking

  • Tokenization

Question 16 of 20

During a security audit, an administrator needs to ensure that only company-approved laptops can connect to the office's wired switches. Which network technology should be configured on each switch port so a user or device must successfully authenticate before any LAN or WLAN traffic is permitted?

  • Create IPSec VPN tunnels between endpoints and the core router for secure connectivity.

  • Enable WPA3 encryption on the wired interfaces to secure all transmitted data.

  • Deploy a next-generation firewall module in each switch to filter traffic at Layer 7.

  • Configure 802.1X authentication on the switch ports to require credentials before granting access.

Question 17 of 20

A security analyst needs to investigate a potential data breach that is suspected to have occurred over the past week. The investigation requires correlating log data from firewalls, servers, and intrusion detection systems to identify suspicious patterns and trace the timeline of events. Which of the following tools is BEST suited for this type of historical analysis and data correlation?

  • A security operations dashboard

  • A real-time network performance monitor

  • A system vulnerability scanner

  • A packet capture utility

Question 18 of 20

An organization's server room entry is secured solely by numerical access codes, which has recently led to heightened concerns about the method's vulnerability to systematic guessing attempts. To increase the difficulty for perpetrators attempting to gain unauthorized entry, which enhancement should be taken?

  • Setting up an audible alert after multiple failed entry attempts.

  • Enhancing video surveillance around the entry area.

  • Installing a biometric authentication system.

  • Intermittent updates to numerical access codes.

Question 19 of 20

An attacker forces a system to use a weaker encryption protocol that has known vulnerabilities. What type of cryptographic attack is being performed?

  • Replay attack

  • Birthday attack

  • Side-channel attack

  • Downgrade attack

Question 20 of 20

A member of the IT department received a call from an individual claiming to be from the telecommunications company that provides services to the organization. The caller requested the IT staff member to confirm sensitive configuration details about the company's PBX system to help resolve an alleged network issue. Which of the following is the BEST course of action for the IT staff member to take?

  • Place the caller on a brief hold to inform a supervisor about the request and then return to share the information

  • Verify the caller's identity by calling back on a known, official number of the telecommunications company before providing any information

  • Tell the caller to send an official request for information through email and then proceed with the call

  • Share the requested information to resolve the network issue promptly as the caller seems knowledgeable about the company's telecommunications setup