00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

What benefit does an organization's focus on the well-being and longevity of its workforce have, particularly in the context of maintaining secure automated systems?

  • Increase in software licensing costs

  • Decrease in the need for user training

  • Reduction in operational risks

  • Expansion of the organization's service portfolio

Question 2 of 15

Which of the following BEST describes how a perimeter security gateway (such as a firewall) handles network traffic?

  • It automatically encrypts all packets that pass through, eliminating the need for VPNs.

  • It forwards traffic originating from inside the network without inspection if trusted ports are used.

  • It inspects traffic in both inbound and outbound directions and can enforce policy on either.

  • It inspects only inbound traffic and cannot filter outbound connections.

Question 3 of 15

Which authentication protocol uses a ticket-granting service as part of its mechanism to provide access to resources across a network?

  • Simple Sign-On

  • Network Access Token

  • Direct Access

  • Kerberos

Question 4 of 15

During an incident response investigation, analysts discover Cyrillic comments and Russian-language debug paths embedded in the source code of malware used in a sophisticated breach. Which of the following BEST explains why this evidence alone cannot be taken as definitive proof that a Russian government agency conducted the attack?

  • Nation-state attackers always encrypt their production builds, so any readable strings must come from reuse by third-party developers.

  • Russian is the default language in most compiler environments, so these markers are inserted automatically during compilation.

  • Threat actors can deliberately embed linguistic and cultural markers as false flags to mislead investigators.

  • Open-source libraries automatically remove national language clues, so variable names are never reliable for attribution.

Question 5 of 15

Which metric is most important for determining the maximum period that a business process can afford to be offline during the recovery phase after a significant disruptive event?

  • Redundancy Strategy

  • Availability

  • Recovery Time Objective

  • Service Level Agreements

Question 6 of 15

A development team is implementing a 'shift-left' security strategy to identify vulnerabilities early in the software development lifecycle (SDLC). The team wants to analyze the application's source code for security flaws, such as potential SQL injection and buffer overflows, without executing the program. Which of the following techniques should the team use?

  • Web application firewall (WAF)

  • Static Application Security Testing (SAST)

  • Fuzzing

  • Dynamic Application Security Testing (DAST)

Question 7 of 15

An employee in the finance department of a multinational corporation has just resigned after being passed over for a promotion. The next day, the company's network experiences an unauthorized transfer of proprietary financial data to an external server. Which motivation is most likely to be the cause behind this incident?

  • Espionage

  • Philosophical/political beliefs

  • Revenge

  • Financial gain

Question 8 of 15

What term is used to describe an environment where there is no connection—wireless or wired—to any external network, guaranteeing a high level of security for sensitive data?

  • Serverless

  • Microservices

  • Air-gapped

  • Virtualized

Question 9 of 15

A security engineer needs to protect sensitive customer records that are stored in a database on an on-premises file server. Which of the following controls would BEST safeguard the data if the physical disks are stolen from the server?

  • Install a host-based intrusion detection system (HIDS) on the server.

  • Configure Transport Layer Security (TLS) for all web applications on the server.

  • Implement full-disk encryption using AES-256.

  • Place the database server in a separate management VLAN.

Question 10 of 15

Which tool helps manage and secure privileged accounts by allowing for the temporary issuing of administrative rights and automatically revoking them after a set time period or task completion?

  • Password managers

  • Just-in-time permissions

  • Password vaulting

  • Ephemeral credentials

Question 11 of 15

A marketing firm has recently hired an analyst who will be working with proprietary client data. What is the most critical action to perform from a security standpoint as part of the onboarding process for this new role?

  • Implement role-based access control to proprietary and sensitive client data systems.

  • Issue security badges for physical access to the firm's offices and client meeting rooms.

  • Provide them with a company email address and user profile for day-to-day communication and tasks.

  • Ensure completion of a general training program that includes corporate culture and policies.

Question 12 of 15

An organization has noticed that employees are accessing sensitive files unrelated to their responsibilities. The company wants to ensure that users can access only the data required for their tasks. Which of the following methods would BEST address this issue?

  • Enforcing multi-factor authentication

  • Applying network segmentation

  • Encrypting all sensitive files

  • Implementing role-based access control

Question 13 of 15

What is the primary function of the RADIUS protocol when it is implemented on a network?

  • Distributing IP addresses to client devices

  • Load balancing traffic between servers

  • Facilitating the handshaking process in a TLS session

  • Centralizing control over who can connect to and use network services

Question 14 of 15

As a security administrator, you have been asked to implement a mechanism that can discover unauthorized access to company resources and alert the security team when such events occur. Which type of security control should you primarily focus on deploying?

  • Compensating control

  • Corrective control

  • Directive control

  • Preventive control

  • Deterrent control

  • Detective control

Question 15 of 15

Data stored on a SAN and not being processed is in which state?

  • Data at rest

  • Data in motion

  • Data in use

  • Data in transit