00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

Your team is in the process of developing a new web application. As a security specialist, you are tasked with performing an assessment to identify potential security flaws. Which technique would allow you to analyze the behavior of the application during execution to identify unexpected outcomes, vulnerabilities or security violations?

  • Performing a detailed review of the source code of the web application before it is compiled

  • Utilizing a configuration compliance scanner to ensure that the servers meet the company's baseline security standards

  • Conducting a run-time evaluation of the web application with a variety of inputs and analysing the response

  • Inspecting and interpreting web application firewall logs to identify potential security issues

Question 2 of 15

What distinguishes a soft authentication token from other methods used in multifactor authentication?

  • It involves the analysis of an individual's physical or behavioral traits and is inherently bound to the user rather than any device.

  • It is a software-based tool that generates a code or signal used to verify a user's identity, which can be installed on devices the user already owns.

  • It is an encrypted file used primarily to establish secure sessions between clients and servers, not particularly for generating authentication codes.

  • It is a physical object that the user possesses and presents as a form of identification to a security checkpoint or device.

Question 3 of 15

How can a network administrator secure a switch port to prevent unauthorized devices from connecting to the network, while also mitigating the risk of address flooding attacks?

  • DHCP snooping

  • Implementing switch port security measures

  • Enabling 802.1X authentication

  • Configuring a captive portal

Question 4 of 15

In the context of cybersecurity, what does the concept of 'Threat Scope Reduction' primarily involve?

  • Minimizing the number of potential threats to an information system by limiting the attack surface and properly segmenting the network.

  • Encrypting all data in transit and at rest to ensure confidentiality and integrity.

  • Responding to security incidents after they occur by developing a comprehensive incident response plan.

  • Utilizing a security model that trusts all internal systems and requires strict verification for external entities only.

Question 5 of 15

In your role as an ISSO within your company, one of your duties is to author policy documents to meet information security mandates. These documents fall under which type of security control category?

  • Managerial

  • Technical

  • Physical

  • Operational

Question 6 of 15

What type of network is especially vulnerable to eavesdropping due to its broadcast nature, making it essential to encrypt sensitive data?

  • Wired

  • Near Field Communication (NFC)

  • Bluetooth

  • Wireless

Question 7 of 15

A company has recently deployed a new network-attached storage (NAS) device for shared access among its employees. What should be the FIRST action to secure the device from unauthorized access?

  • Monitor network traffic going in and out of the device for suspicious activity.

  • Update the device's firmware to the latest version.

  • Conduct a regular security audit of the device's configuration and usage.

  • Change the device's default administration username and password.

Question 8 of 15

Which type of disaster-recovery site provides immediate failover with minimal downtime by maintaining a fully operational duplicate of the primary environment?

  • Hot site

  • Cold site

  • Warm site

  • Offsite tape backup only

Question 9 of 15

What is the BEST initial approach when conducting a penetration test on an organization's network having no prior knowledge of their security posture, to ensure compliance with security testing protocols and minimize the risk of disruption?

  • Perform passive reconnaissance to collect information without interacting with the target system to avoid legal repercussions.

  • Refer to the Rules of Engagement to define the scope and boundaries of the penetration test before starting any probing activities.

  • Start with network mapping to determine the layout of the target infrastructure and systems.

  • Initiate an active reconnaissance phase to immediately identify exploitable vulnerabilities in the organization's network.

Question 10 of 15

Which of the following statements best describes the relationship between managerial controls and technical controls?

  • Managerial controls provide the framework for implementing technical controls

  • Managerial controls are solely responsible for preventing security incidents

  • Managerial controls are a subset of technical controls

  • Managerial controls replace the need for technical controls

Question 11 of 15

A company's competitor has been found to be spreading false information about the company's financial stability, intending to manipulate stock prices and discredit the company in the eyes of investors and customers. This deliberate spread of misleading content is intended to cause harm to the company. What type of activity does this scenario best exemplify?

  • Hacking

  • Whaling

  • Phishing

  • Disinformation

Question 12 of 15

A healthcare organization based in California is expanding its services to a neighboring state with distinct data privacy laws. To ensure compliance with the new regional regulations, which element of effective security governance should the organization prioritize updating?

  • Implementing a global encryption standard across all offices

  • Enhancing physical security measures at the new location

  • Revising the Incident Response plan based on national guidelines

  • Updating the Information Security Policies to include state-specific compliance requirements

Question 13 of 15

Alice, a security administrator, needs to verify that the servers in her organization are in a known and trusted state before they process sensitive data. The process involves generating a set of measurements that reflect the current state of the servers and comparing them against a set of known good values provided by the vendor. Which of the following best describes the process Alice should implement to meet this requirement?

  • Setting BIOS passwords to prevent unauthorized changes to hardware settings

  • Configuring the servers to enable remote wiping in case they fail a security check

  • Hashing system files at startup and sending the hashes to a central server for comparison

  • Implementing a Trusted Platform Module (TPM) to perform remote attestation of the servers during boot-up

Question 14 of 15

An organization's server room entry is secured solely by numerical access codes, which has recently led to heightened concerns about the method's vulnerability to systematic guessing attempts. To increase the difficulty for perpetrators attempting to gain unauthorized entry, which enhancement should be taken?

  • Setting up an audible alert after multiple failed entry attempts.

  • Intermittent updates to numerical access codes.

  • Installing a biometric authentication system.

  • Enhancing video surveillance around the entry area.

Question 15 of 15

Your organization is handling sensitive government contracts and must ensure that information related to these projects is guarded against unauthorized physical access. In accordance with data classification policies, which of the following is the BEST way to handle such data?

  • Store the data in a physically secure location and enforce strict access controls

  • Institute policies for secure disposal of printouts and storage media containing the data

  • Encrypt all data and frequently change encryption keys

  • Enable detailed logging of all access to the data for audit purposes