00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

A financial institution wants to reduce the risk of sensitive customer data exfiltration by employees. Which of the following would be the MOST effective measure to implement?

  • Enforcing the use of strong encryption protocols for data at rest.

  • Enabling biometric authentication on all data systems.

  • Segmenting the internal network based on departmental functions.

  • Disabling unused physical and logical service ports company-wide.

  • Implementing monitoring and blocking of suspicious data transfers.

Question 2 of 15

A healthcare organization relies on specialized equipment that operates on a legacy system which cannot be patched due to vendor abandonment. To maintain the highest level of security, what should be the organization's FIRST step in mitigating the risks associated with the inability to patch this system?

  • Deploy an additional firewall specifically for the legacy system

  • Scheduling more frequent vulnerability scans

  • Applying antivirus software updates more frequently

  • Network segmentation

Question 3 of 15

Regular auditing of user permissions and access rights primarily belongs to which type of security control?

  • Preventive control

  • Deterrent control

  • Detective control

  • Corrective control

Question 4 of 15

Which of the following best represents the role of endpoint protection software as a system hardening technique in an organization's cybersecurity strategy?

  • To backup data periodically and ensure disaster recovery for individual endpoint devices

  • To manage user permissions and access control lists across the network

  • To optimize the performance and speed of endpoint devices for better user experience

  • To provide comprehensive security measures, such as antivirus and personal firewall capabilities, to individual devices within a network

Question 5 of 15

An organization that handles top-secret defense research maintains a database server containing classified schematics. To comply with policy, the server must be completely unable to send or receive data over any wired or wireless network, thus preventing remote compromise or accidental data exfiltration. Which strategy best satisfies this requirement?

  • Enabling a host-based firewall

  • Deploying an Intrusion Detection System (IDS)

  • Implementing an air-gapped system

  • Using network segmentation with VLANs

Question 6 of 15

Which authentication factor category includes using a user's geographic location to grant access to a system?

  • Somewhere you are

  • Something you are

  • Something you know

  • Something you have

Question 7 of 15

A country's primary power grid and water treatment facilities have experienced a series of sophisticated, coordinated cyber attacks aimed at causing widespread service disruption. Which of the following threat actors is MOST likely responsible for this type of attack?

  • Insider threat

  • Hacktivist

  • Organized crime

  • Nation-state

Question 8 of 15

Which type of security control is primarily used to identify unauthorized access or activities on a network?

  • Intrusion Detection System (IDS)

  • Security Policies

  • Backup Systems

  • Firewalls

Question 9 of 15

Which network setup involves isolating a system from external network connections to enhance security?

  • Virtual LAN (VLAN)

  • Split tunneling

  • Software-defined network (SDN)

  • Air-gap

Question 10 of 15

During disposal of storage media, due to regulatory requirements some of the data is required to be saved for a certain period of time. This is an example of what?

  • Sanitization

  • Data retention

  • Certification

  • Destruction

Question 11 of 15

An organization stores highly sensitive financial records in an on-premises relational database. Role-based access control (RBAC) already limits each employee to only the tables required for their job duties. Security analysts are concerned that an attacker could still read the data if they steal a legitimate user's password. Which of the following additional controls would BEST mitigate this risk?

  • Increase the minimum password length for all database users from 8 to 12 characters.

  • Disable verbose SQL error messages returned to clients.

  • Require multi-factor authentication (MFA) for all database logins.

  • Enable full-disk encryption on the database server.

Question 12 of 15

A development team seeks a method to deploy applications in a lightweight, portable manner that ensures consistency across multiple environments. Which of the following technologies allows them to package applications with their dependencies in isolated environments?

  • Virtualization

  • Microservices

  • Serverless computing

  • Containerization

Question 13 of 15

An organization publishes an acceptable-use policy that outlines how employees may access and utilize company resources. Which type of security control does this policy represent?

  • Detective control

  • Preventive control

  • Compensating control

  • Directive control

Question 14 of 15

What type of backup is a copy of the entire state of a system and it can be used to restore that system and other similar systems to that exact state/configuration?

  • Differential

  • Incremental

  • Full

  • Image

Question 15 of 15

You are the resident IT within your family. While relaxing and enjoying a family Thanksgiving dinner your sweet old Grandmother mentions that Microsoft called her cell phone and helped her with a virus on her computer. You explain to her that Microsoft does not call people directly to help with computer issues and that she was likely targeted by a malicious attacker. You scan her computer for viruses and find several. Your poor sweet old Grandmother was a victim of what type of attack?

  • Spear phishing

  • Vishing

  • Tailgaiting

  • phonejacking