00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

Which of the following best describes the concept of availability in the context of high availability systems?

  • The capability of a system to facilitate the immediate processing of data inputs and outputs

  • The assurance that systems and services are reliable and can operate without excessive downtime

  • A security measure that involves ensuring a computer or network is physically isolated from other networks

  • The ability of a system to quickly restore operations and functionality following an outage

Question 2 of 15

You are taking a walk around the neighborhood. You see a sign in one of your neighbor’s unfenced yards that reads “No trespassing!” in large red letters. The sign is what type of control?

  • Preventive

  • Corrective

  • Detective

  • Deterrent

  • Compensating

Question 3 of 15

An IT staff member is tasked with the day-to-day management of information assets, including implementing backup and recovery procedures and maintaining security controls, but does not have authority to make policy decisions regarding the data. What role does this staff member hold in the organization?

  • Data Processor

  • Data Controller

  • Data Owner

  • Data Custodian

Question 4 of 15

A regional healthcare organization regularly faces threats from severe weather events and has tasked the IT department with enhancing their business continuity plan. Leadership's primary goal is to ensure continuous operation of essential systems with no perceptible downtime in the event of a weather disaster. What update to the business continuity plan would BEST reflect leadership's priority for maintaining uninterrupted essential services?

  • Assemble a control center dedicated to managing communication and coordination during emergency responses

  • Build and maintain a facility that is prepared and available on-demand for immediate operational takeover of essential systems

  • Enhance network infrastructure to manage a higher volume of data traffic during emergency situations

  • Outline strict targets for the time to restore essential services and schedules for critical data backups

Question 5 of 15

Your company has a policy that requires all stored user passwords to be protected. Which method would be MOST appropriate to use when storing these passwords to maintain security while allowing user authentication to continue to work effectively?

  • Hashing passwords

  • Encrypting passwords with a symmetric key

  • Encoding passwords with Base64

  • Storing passwords in plaintext

Question 6 of 15

What type of security device passively monitors network traffic and alerts administrators or other systems when it detects suspicious activities or known threats?

  • Firewall

  • Load balancer

  • Intrusion Prevention System (IPS)

  • Intrusion Detection System (IDS)

Question 7 of 15

A cybersecurity analyst is reviewing a threat intelligence report detailing an attack on a national power grid. The attack did not involve ransomware or data exfiltration for financial purposes but instead caused widespread service outages. Which of the following threat actors is MOST likely responsible for this type of attack?

  • Organized crime

  • Hacktivist

  • Nation-state

  • Insider threat

Question 8 of 15

Your organization is rolling out a new line of laptops to employees who handle sensitive data. These devices will be storing encryption keys, digital certificates, and passwords. The IT department is required to ensure that the keys used for disk encryption are stored in a way that is resistant to tampering and can provide platform integrity verification. What embedded solution on the laptops should be utilized to achieve this level of security?

  • Apply a Key Management System for all user credentials.

  • Use the Trusted Platform Module (TPM) on the laptops.

  • Implement a Secure Enclave within the laptop's central processing unit.

  • Integrate a separate Hardware Security Module (HSM) for each laptop.

Question 9 of 15

During a review process against the organization's security objectives and regulatory compliance needs, disparities were discovered, indicating that certain control measures are inadequate. Which course of action best aligns with recommended practice for addressing these deficiencies?

  • Create an actionable remediation plan outlining steps to bridge the identified security gaps and align with the desired benchmarks.

  • Initiate a series of in-depth security training sessions to address every gap identified in the review.

  • Deploy an advanced intrusion detection system immediately across the network to mitigate any vulnerabilities.

  • Revise security policies immediately to the levels of the industry standards discovered during the review, without a structured plan.

Question 10 of 15

Which access control model requires continuous verification and context-aware authorization to ensure the security of resources?

  • Mandatory Access Control (MAC)

  • Role-Based Access Control (RBAC)

  • Discretionary Access Control (DAC)

  • Zero Trust Model (ZTM)

Question 11 of 15

What is the primary function of a hashing algorithm within the realm of cybersecurity?

  • To serve as the public key within a public-private key pair used for asymmetric encryption

  • To encrypt data so that it can be securely transmitted over public networks

  • To generate a unique 'fingerprint' of data that can be used to verify its integrity

  • To compress data to save storage space before transmitting over a network

Question 12 of 15

Which solution is employed to collect and analyze security-related data from various hardware and software sources in order to identify unusual patterns and alert on potential security incidents?

  • Security Information and Event Management (SIEM)

  • Unified Threat Management (UTM)

  • Automated Vulnerability Scanning tool

  • Intrusion Prevention System (IPS)

Question 13 of 15

Which security measure enforces policies to control data storage and access within designated boundaries to meet regional regulatory requirements?

  • File transfer limitations

  • Network address translation

  • Site-to-site VPN use

  • Geographic restrictions

Question 14 of 15

When an employee suspects that an email message is a sophisticated spear phishing attempt, what is the most prudent immediate action for the security team?

  • Send out a company-wide alert about the potential spear phishing attempt

  • Immediately shut down network services to prevent a potential breach

  • Quarantine the message to initiate a review process

  • Reply to the sender to confirm the validity of the email

Question 15 of 15

What type of security control is implemented when the primary control cannot be used due to technical, financial, or operational constraints?

  • Detective controls

  • Preventive controls

  • Compensating controls

  • Deterrent controls