00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

When a digital certificate needs to be invalidated prior to its expiration, which of the following is updated to indicate that this certificate should no longer be trusted?

  • Certificate Signing Request (CSR)

  • Online Certificate Status Protocol (OCSP)

  • Root of Trust

  • Wildcard Certificate

  • Certificate Revocation List (CRL)

Question 2 of 20

The software section of the security team has been asked to review the source code for a program being developed. They are being asked to look for any coding errors or possible security vulnerabilities. This is what type of application security review?

  • Static code analysis

  • Dynamic code analysis

  • Secure coding

  • Fuzzing

Question 3 of 20

A corporation requires a method to ensure that its staff can connect to internal resources from outside the office environment with assured confidentiality and integrity of data. Which solution would BEST meet this requirement while providing encrypted channels for remote endpoint connectivity?

  • Setting up remote access servers that allow direct connections from the internet.

  • Utilizing end-to-end encrypted tunneling services with access control.

  • Configuring encrypted gateways at the network perimeter for enhanced security.

  • Enforcing perimeter security controls that prevent unauthorized network entry.

Question 4 of 20

As the lead security analyst at a financial institution, you have been tasked with evaluating the effectiveness of the implemented security controls. During the audit, you need to verify that access control policies are correctly enforced and that there are no deviations from the standard configurations across all servers. Which of the following audit practices would be the MOST effective for this purpose?

  • Performing a performance audit

  • Conducting a configuration audit

  • Undertaking an operational audit

  • Executing a financial audit

Question 5 of 20

Which activity is MOST critical for an organization to perform when establishing an incident response capability to ensure effectiveness during security incidents?

  • Holding a retrospective meeting to discuss incident handling

  • Developing and documenting the incident response policy

  • Distributing the employee security handbook

  • Conducting regular employee background checks

Question 6 of 20

A company's IT department recently received complains from several employees that they've been contacted by 'tech support' via phone call, requesting their login credentials to resolve a supposed network issue. Which of the following best describes this type of security threat?

  • Email phishing

  • Pretexting

  • Vishing

  • Smishing

Question 7 of 20

During a security incident, after initial detection and analysis, an IT security analyst is determining which course of action to take to limit the damage and prevent extended downtime. Out of the following options, which should be prioritized?

  • Recovery

  • Containment

  • Lessons learned

  • Eradication

Question 8 of 20

An organization experienced a data breach compromising customer data. Following the incident, the security team implemented measures to restore affected systems and reduce the impact of the breach. Which of the following actions is an example of a corrective control?

  • Displaying warning banners on login screens to deter unauthorized access.

  • Restoring data from backups and applying patches to affected systems.

  • Implementing stronger network firewalls to prevent future breaches.

  • Conducting a forensic analysis to determine how the breach occurred.

Question 9 of 20

XYZ Corporation utilizes a primary and secondary data center for their mission-critical systems to maintain uptime in case of failure. When the primary data center experiences an outage, systems automatically switch to the secondary data center without manual intervention. Which type of failover strategy is XYZ Corporation employing?

  • Active-active configuration

  • Automatic failover

  • Manual failover

  • Active-passive configuration

Question 10 of 20

What technique should be used to restrict dedicated administrative access to only the necessary times when it is needed, thereby reducing the exposure time of elevated privileges?

  • Just-in-time permissions

  • Multifactor authentication

  • Security group assignments

  • Password vaulting

Question 11 of 20

A company is transitioning to a permanent hybrid work model where employees will split their time between the office and home. To adapt its operational security (OpSec) program, which of the following actions is the MOST crucial for the security team to implement?

  • Developing and enforcing policies for secure remote access, home network configuration, and use of personal devices.

  • Strengthening the physical access controls for the on-premises data center.

  • Decommissioning all on-premises servers in favor of a cloud-only infrastructure.

  • Mandating that all employees attend quarterly security briefings in person at the corporate headquarters.

Question 12 of 20

An organization's network has been compromised with software that appeared legitimate but has provided attackers with unauthorized access. Which of the following BEST describes the type of malware used in this scenario?

  • Virus

  • Trojan

  • Ransomware

  • Spyware

Question 13 of 20

You have joined a new enterprise as a member of the IT Security team. During on boarding you receive two computers, one with access to highly confidential systems and one with access to less critical data and the internet. You cannot send data or documents from one network to the other and have to manage separate credentials for each. What concept best defines this approach?

  • Air gap

  • VPN

  • Data aggregated network segmentation (DANS)

  • Physical de-segmentation

Question 14 of 20

An organization needs to apply a critical security patch that may disrupt services. Which business process should be followed to ensure minimal impact on operations?

  • Deploy the update while ensuring it does not adversely affect current operations.

  • Schedule the update during a designated timeframe after conducting an impact analysis.

  • Apply the update at a time when it can be closely monitored for any issues.

  • Notify users and install the update with consideration of potential disruption.

Question 15 of 20

An organization mandates that all employees use smart cards for secure access to the building. However, a group of contractors does not have smart cards due to administrative delays. What is the BEST action the organization can take to ensure these contractors can access the building securely?

  • Allow contractors to follow employees through secure entrances

  • Provide temporary access badges to the contractors

  • Exempt the contractors from access controls until they receive smart cards

  • Provide a shared access key for the contractors to use

Question 16 of 20

A development team seeks a method to deploy applications in a lightweight, portable manner that ensures consistency across multiple environments. Which of the following technologies allows them to package applications with their dependencies in isolated environments?

  • Serverless computing

  • Virtualization

  • Containerization

  • Microservices

Question 17 of 20

A large multinational corporation is experiencing a persistent wave of cyber-attacks characterized by website defacements and data leaks. These incidents are accompanied by messages expressing opposition to the corporation's involvement in various international projects. What type of threat actor is most likely responsible for these activities?

  • Nation-state

  • Insider threat

  • Hacktivist

  • Organized crime

Question 18 of 20

An organization requires administrators to authenticate to a dedicated server before accessing critical systems within a secure network segment. Which of the following network appliances is being used to enforce this security measure?

  • Load balancer

  • Proxy server

  • Router

  • Jump server

Question 19 of 20

An employee in the finance department receives an email from the CEO asking for immediate review of an attached document labeled 'Financial_Report_2023.xls'. The employee was not expecting any reports today. What potential threat could this file pose if the employee fails to take proper security measures before opening it?

  • The attachment is likely a template for future financial reports and opening it would set a new standard format.

  • Opening the file will automatically archive older financial reports for efficiency purposes.

  • The file may contain malicious code that can execute upon opening, compromising the integrity of the employee's system.

  • The file could be a duplicate of a file already present on the network, leading to data redundancy.

Question 20 of 20

What is the role of guard rails in an automated security environment?

  • Guard rails define boundaries to ensure automated tasks do not compromise security or compliance.

  • Guard rails are automated scripts that handle security incidents without human intervention.

  • Guard rails are tools for monitoring network traffic and alerting on suspicious activities.

  • Guard rails refer to the physical security measures used to protect hardware in a data center.