⚡️ Pass with Confidence Sale - 40% off ALL packages! ⚡️

2 days, 9 hours remaining!
00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

Which type of social engineering attack specifically targets high-level executives through email in an attempt to steal sensitive information?

  • Typosquatting

  • Spear phishing

  • Whaling

  • Watering hole attack

  • Pharming

  • Vishing

Question 2 of 20

Which of the following best describes the primary focus of operational security controls?

  • Establishing security policies and procedures

  • Implementing and managing security technologies

  • Protecting physical assets and premises

  • Focusing on day-to-day security operations and tasks

Question 3 of 20

During a routine vulnerability assessment of the network, an analyst receives a notification of potential malicious traffic that, upon further investigation, turns out to be legitimate and normal network activity. What does this notification exemplify?

  • A false negative

  • An intrusion attempt

  • A true positive

  • A false positive

Question 4 of 20

An IT department wants to reduce the time it takes to grant new employees access to necessary systems and applications by automating this process. Which use case of automation and scripting best addresses this need?

  • Ticket creation

  • Security groups

  • Continuous integration and testing

  • User provisioning

Question 5 of 20

Which legal principle establishes the right of individuals to request the removal of their personal information from organizational databases or records, especially in cases where the information is no longer relevant or accurate?

  • Data Retention

  • Right to Be Forgotten

  • Data Sovereignty

  • Information Custodian

Question 6 of 20

An employee in a financial institution accidentally visited a website by mistyping the URL of a popular financial news portal. Subsequently, the employee reported that their workstation displayed unusual behavior, such as the browser opening on its own and displaying advertisements. The IT security team suspects a security incident through domain impersonation. What is the likely method used by the threat actor to compromise the employee's workstation?

  • Phishing attempt through a deceptive email

  • Typosquatting

  • Domain kiting

  • Domain slamming

Question 7 of 20

Firewall logs exclusively show outbound traffic and therefore do not provide sufficient data to detect potential inbound intrusion attempts.

  • True

  • False

Question 8 of 20

After a risk assessment it is decided that security controls will be applied to a system to lower the likelihood of an incident occurring from a risk being exploited. Which risk management strategy is being used?

  • Acceptance

  • Transference

  • Mitigation

  • Avoidance

Question 9 of 20

You have been called to the office of the CEO for a confidential meeting. In the meeting the CEO informs you he 'has a virus that won't let him login without paying a fee.' You begin to investigate the issue and find that the CEO downloaded a file from a website a friend shared on a social media site. After downloading the file his computer restarted and now will not allow anyone to login unless they enter credit card information. Which option best describes the attack used in this scenario based on the information available?

  • The CEO executed a Rootkit which gave backdoor access to a hacker

  • The CEO downloaded and executed Ransomware

  • A botnet is attacking the CEO's computer and disabling login attempts

  • The CEO was the target of a spear phishing social engineering attack

Question 10 of 20

A cloud administrator is deprovisioning a virtual machine (VM) that was used to process sensitive financial data. The underlying physical server hosts multiple VMs from different clients. The administrator needs to ensure that no data from the deprovisioned VM can be accessed by the next VM allocated to the same physical memory space. Which of the following vulnerabilities should be the administrator's PRIMARY concern to mitigate?

  • Race condition

  • Resource reuse

  • VM escape

  • Buffer overflow

Question 11 of 20

An organization wants to implement a system where users authenticate once and gain access to multiple related systems without re-entering credentials. What authentication method should they deploy?

  • Biometric Authentication

  • Single Sign-On

  • Federated Identity Management

  • Multifactor Authentication

Question 12 of 20

What is the primary purpose of a Gateway when related to enterprise network security?

  • To exclusively monitor the performance of network devices and services

  • To encrypt data stored on endpoints within the network

  • To act as an access or exit point between two networks, often controlling data traffic

  • To authenticate user identities before granting access to network resources

Question 13 of 20

An organization is still using several workstations that run an operating system whose vendor ended support last year. Which of the following security concerns is MOST directly associated with continuing to operate this unsupported system?

  • The only impact is higher power and cooling costs due to outdated hardware.

  • The operating system will automatically disable network services when weaknesses are detected.

  • User productivity will decrease because the OS lacks new usability features.

  • The system contains unpatched vulnerabilities that attackers can exploit.

Question 14 of 20

Which password policy most effectively enhances security by ensuring passwords are difficult to guess or crack?

  • Enforcing passwords to be at least 12 characters long and include uppercase letters, lowercase letters, numbers, and special characters.

  • Implementing a maximum password age of 90 days to ensure regular password changes.

  • Allowing users to reuse their previous six passwords to simplify password management.

  • Encouraging users to create passwords using easily memorable phrases.

Question 15 of 20

Which deception technology involves deploying a decoy system or service that imitates a genuine production asset in order to attract, engage, and monitor attackers?

  • Honeypot

  • Honeyfile

  • Honeynet

  • Honeytoken

Question 16 of 20

During a regular security scan of the network you find that several user laptops are infected with the same malware. After cross-referencing the laptop users with the reverse proxy logs you find that they all accessed a industry news website the day before. You believe your organization may have been specifically targeted for this malware. What type of attack would best describe this theory?

  • SYN Flood

  • Watering hole

  • SQL injection

  • Spoofing

Question 17 of 20

A security administrator is implementing an encryption system that uses two distinct, but related keys. One key is used for encrypting data, and the other is used for decrypting it. What type of cryptography is being implemented?

  • Symmetric key cryptography

  • Asymmetric key cryptography

  • Hashing

  • Block cipher

Question 18 of 20

Crucial Technologies employs software to restrict employees from accessing certain websites or receiving certain types of emails. They are employing what type of control?

  • IDS

  • DLP

  • IPS

  • Content filter

Question 19 of 20

An organization needs a backup facility that can quickly take over full operations with minimal downtime in the event of a disaster. Which type of site should they implement?

  • Warm site

  • Hot site

  • Reciprocal site

  • Cold site

Question 20 of 20

As a security consultant evaluating an organization's data management practices, you determine that there is a need to appoint an individual responsible for making decisions about the data, establishing control mechanisms, and determining data classification levels. Which role is best suited for these responsibilities?

  • Controller

  • Owner

  • Processor

  • Custodian/Steward