00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

Your coworker identified a vulnerability for a 3rd party software solution hosted on premise. The coworker is out sick today and has asked you remediate this issue as quickly as possible. You have identified a patch to fix the security vulnerability from the vendor's official website. What step should you take NEXT?

  • Begin monitoring for related incidients

  • Install the patch immediately and inform affected users

  • Start the incident response process

  • Submit a change request based on the companies change management processes

Question 2 of 15

A company is about to enter into an agreement with a cloud service provider. Which of the following should the company primarily focus on to ensure timely and effective remediation of service interruptions?

  • Recovery Time Objective (RTO)

  • Reconnaissance

  • Annualized Loss Expectancy (ALE)

  • Mean Time to Repair (MTTR)

Question 3 of 15

When a hypervisor reallocates previously used memory pages or disk blocks to a different virtual machine without securely wiping them first, which specific security risk does this resource-reuse vulnerability create?

  • Denial-of-service caused by excessive CPU scheduling of VMs

  • Privilege escalation from the guest VM to the host hypervisor

  • Bypass of network segmentation through a virtual-switch flaw

  • Data remanence that could expose residual information to another VM

Question 4 of 15

What does RPO define in a disaster recovery strategy?

  • The time to restore IT systems after a disruption.

  • The amount of data an organization can afford to lose, measured in time.

  • The procedures used to handle security incidents.

  • The strategies implemented to prevent unauthorized access to systems.

Question 5 of 15

Which of the following best describes why an organization must be aware of local and regional regulations when developing their security program?

  • To ensure compliance with specific legal requirements that may not be covered by national or global standards.

  • To simplify the security program management by adhering to broader compliance laws.

  • To apply universal standards of cybersecurity that are recognized globally.

  • To avoid the need for customizing security measures for different company branches.

Question 6 of 15

Which category of security controls focuses on establishing policies, procedures, and guidelines to manage security risks?

  • Operational Controls

  • Physical Controls

  • Managerial Controls

  • Technical Controls

Question 7 of 15

Which policy should be established to define the proper behaviors and usage expectations for employees when interacting with the company's IT systems?

  • Change Management Policy

  • Information Security Policy

  • Acceptable Use Policy

  • Software Development Lifecycle Policy

Question 8 of 15

Which password attack technique involves attempting access with a set of commonly used passwords on multiple user accounts to avoid account lockout policies?

  • Password spraying

  • Credential stuffing

  • Dictionary attack

  • Brute force attack

Question 9 of 15

A company is preparing to deploy a new web application onto its cloud infrastructure. The security team is tasked with implementing a deployment strategy that ensures the highest level of security while maintaining efficiency. Which of the following deployment strategies BEST meets this requirement?

  • Implement automated deployment tools with pre-configured security checks integrated into the deployment pipeline

  • Carry out manual deployment with step-by-step security verification performed by the IT security staff

  • Use a phased deployment approach, gradually increasing the number of users while monitoring for security issues

  • Conduct scheduled deployment during off-peak hours with subsequent manual security post-checks

Question 10 of 15

Which of the following best describes the concept of 'Internet of Things' as it pertains to security architecture?

  • A framework for managing traditional IT infrastructure such as servers and desktops.

  • A centralized platform for deploying large-scale industrial control systems.

  • A software protocol that allows devices to communicate over the internet.

  • A network of interconnected devices that collect, exchange, and process data over the internet or other communication networks.

Question 11 of 15

What does the term 'resource provisioning' refer to in the context of securing computing resources?

  • The process of allocating and managing computing resources to users or systems according to security policies

  • The act of installing antivirus software on workstations and servers

  • The storage and classification of organizational data in accordance with established compliance requirements

  • The step-by-step methodology of responding to security incidents

Question 12 of 15

An organization needs to ensure that encrypted data remains accessible even if an employee's cryptographic credentials are lost or become unavailable. Which of the following methods BEST achieves this objective?

  • Implementing key escrow

  • Applying key stretching techniques

  • Utilizing certificate revocation lists

  • Issuing digital certificates

Question 13 of 15

During an audit of the company's disaster-recovery plan, the security administrator must recommend a backup technique that consumes the smallest amount of storage while backing up only data modified since the most recent full or incremental job. Which backup type should the administrator choose?

  • Differential backup

  • Incremental backup

  • Snapshot

  • Full backup

Question 14 of 15

Which term best describes the ability of a system or component to be operational and accessible when required for use?

  • Load balancing

  • Scalability

  • High availability

  • Failover

Question 15 of 15

An organization's server room entry is secured solely by numerical access codes, which has recently led to heightened concerns about the method's vulnerability to systematic guessing attempts. To increase the difficulty for perpetrators attempting to gain unauthorized entry, which enhancement should be taken?

  • Enhancing video surveillance around the entry area.

  • Intermittent updates to numerical access codes.

  • Setting up an audible alert after multiple failed entry attempts.

  • Installing a biometric authentication system.