00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

You are the system administrator for your company. You notice that a large number of accounts have been locked out due to incorrect password entries. This is most likely an indicator of which type of malicious attack?

  • Brute force

  • Trojan

  • Keylogger

  • Ransomware

Question 2 of 20

In an organization's risk management framework, when might an exemption be most appropriately granted?

  • When compliance with a security policy or control is either not feasible or not cost-effective relative to the reduction in risk it would bring

  • Whenever a key stakeholder dislikes the constraints imposed by a certain policy or standard

  • As a habitual practice for lower-priority systems to minimize the effort spent on security

  • When there is insufficient budget to implement any security measures and all risks need to be accepted

Question 3 of 20

Which of the following best describes the role of sensors within an Intrusion Detection System (IDS)?

  • Optimizing network traffic flow to ensure high availability and performance

  • Analyzing network traffic to detect patterns that might indicate a security threat

  • Blocking traffic that originates from untrusted sources to prevent network intrusions

  • Logging all inbound and outbound traffic without performing analysis for potential threats

Question 4 of 20

What aspect of data retention policies is MOST crucial for ensuring compliance with legal and regulatory frameworks?

  • The encryption strength used to protect data during the retention period

  • The length of time that data must be stored before it can be destroyed or archived

  • The storage costs associated with different types of data

  • The categorization of data as sensitive, confidential, or public

Question 5 of 20

An organization has noticed that employees are accessing sensitive files unrelated to their responsibilities. The company wants to ensure that users can access only the data required for their tasks. Which of the following methods would BEST address this issue?

  • Implementing role-based access control

  • Encrypting all sensitive files

  • Applying network segmentation

  • Enforcing multi-factor authentication

Question 6 of 20

A security analyst implements intrusion detection sensors and automated log analysis tools. The primary purpose of these tools is to identify anomalies or disruptions in network traffic and system activities and then trigger an alert. Which type of security control does this implementation represent?

  • Preventive

  • Deterrent

  • Detective

  • Corrective

Question 7 of 20

A multinational company has recently launched a cloud service platform and is considering introducing a bug bounty program to enhance its security measures. What is the most important reason for the company to integrate a bug bounty program into its vulnerability management process?

  • To ensure the company's compliance with international cybersecurity regulations and standards.

  • To uncover otherwise undetected vulnerabilities by leveraging the collective efforts of the global security research community.

  • To focus specifically on mitigating zero-day exploits by having them reported through the program.

  • To promote the company's dedication to transparency and foster trust among its user base.

Question 8 of 20

When configuring a network appliance to view traffic without altering it, which device attribute should it have?

  • Active

  • Passive

  • Tap/Monitor in active mode

  • Inline

Question 9 of 20

What describes an environment where the cloud provider dynamically manages the allocation of machine resources?

  • Users manually scale and manage virtual machine instances to meet the application's workload

  • A system where applications, dependencies, and systems are packaged together in a computing environment

  • The cloud provider's automatic management of resource allocation for executing code without requiring the user to manage infrastructure

  • Applications are constructed as a suite of small, independent services that perform specific business functions

Question 10 of 20

Under what type of control would you classify antivirus software?

  • Physical

  • Administrative

  • Operational

  • Technical

Question 11 of 20

Which of the following techniques is specifically designed to obscure sensitive data by replacing it with realistic but fictitious values so that the data set remains usable for developers and testers while protecting the original information from unauthorized disclosure?

  • Differential backup

  • Data masking

  • Multifactor authentication

  • Lossless compression

Question 12 of 20

A network administrator is deploying an inline intrusion prevention system (IPS). Security policy dictates that if the IPS software crashes or the appliance loses power, no traffic may bypass inspection. Which of the following failure modes should the administrator configure on the IPS to satisfy this requirement?

  • Failover

  • Fail-open

  • Fail-closed

  • Fail-safe

Question 13 of 20

Which type of disaster-recovery site provides immediate failover with minimal downtime by maintaining a fully operational duplicate of the primary environment?

  • Cold site

  • Warm site

  • Hot site

  • Offsite tape backup only

Question 14 of 20

A government institution is assessing potential threats and identifies an actor with significant financial resources and advanced technical skills aiming to steal sensitive customer data. Which threat actor best fits this profile?

  • Unskilled attacker

  • Insider threat

  • Hacktivist

  • Nation-state

Question 15 of 20

Which of the following best describes the primary purpose of a security policy?

  • To specify encryption standards for data at rest and in transit

  • To detail specific incident response procedures

  • To define access control lists for network resources

  • To provide a high-level framework for an organization's approach to security

Question 16 of 20

Which of the following statements BEST explains why legacy hardware systems remain attractive targets for cybercriminals?

  • They often lack security patches and modern controls, making them easier to exploit.

  • Their proprietary hardware makes exploits prohibitively expensive, so attackers avoid them.

  • They are automatically isolated from networks, preventing remote attacks.

  • They are less likely to be targeted because outdated technology deters attackers.

Question 17 of 20

An organization needs to securely establish encryption keys with external partners over the internet without any prior shared secrets. Which cryptographic method BEST facilitates this secure key establishment?

  • MD5 hashing algorithm

  • Diffie-Hellman algorithm

  • Symmetric key distribution

  • RSA digital signatures

Question 18 of 20

A security analyst is concerned about the risk of VM escape attacks in the company's virtualized datacenter. Which of the following strategies provides the most comprehensive mitigation against this type of vulnerability?

  • Exclusively using process isolation to separate the guest VM from the host's kernel.

  • Deploying host-based intrusion detection systems (HIDS) on all guest virtual machines.

  • A defense-in-depth approach, including keeping the hypervisor and guest OS patched, implementing strict access controls, and network segmentation.

  • Encrypting all data-at-rest on the virtual machines' storage volumes.

Question 19 of 20

During the procurement phase for new computing resources, what is the BEST practice to ensure their security while integrating into the organization's existing infrastructure?

  • Negotiating the lowest cost for products

  • Checking compatibility with current systems

  • Conducting a security review of the vendor and their products

  • Choosing products with the newest features

Question 20 of 20

An employee of a financial institution receives a text message prompting them to urgently verify their login credentials due to suspicious account activities by clicking on a link provided in the message. The employee was not expecting any such communication and finds the request unusual. To best describe this situation, which of the following terms is most applicable?

  • Smishing

  • Typosquatting

  • Vishing

  • Whaling