00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

During a routine security audit, the administrator discovers that two different archived log files produce the exact same SHA-1 hash value, even though their contents differ. Which type of cryptographic attack does this finding most likely indicate?

  • Birthday attack

  • Downgrade attack

  • Replay attack

  • Collision attack

Question 2 of 15

Which of the following is a physical control designed to allow visibility and detection of unauthorized entry while limiting the potential of physical confrontations?

  • Bollards

  • Mantrap

  • Surveillance cameras

  • Keypad door locks

Question 3 of 15

Which of the following options is considered a 'something you have' factor in multifactor authentication?

  • Security token

  • Password

  • Voice recognition

  • Fingerprint

Question 4 of 15

An organization wants to ensure that clients accessing their services can determine in real-time whether certificates are valid or not. Which of the following should the organization implement to enable real-time certificate validation by clients?

  • CSR

  • Self-signed certificates

  • OCSP

  • CRL

Question 5 of 15

A security administrator at a mid-size company is selecting an algorithm for secure email encryption that relies on a public/private key pair rather than a shared secret, to implement digital signatures as well. Which of the following algorithms satisfies this requirement?

  • AES

  • RSA

  • RC4

  • Blowfish

Question 6 of 15

Why is it crucial for an organization to ensure the availability of patches for its systems and software?

  • To change the software vendor's terms and conditions

  • To ensure systems are constantly upgraded with new features

  • To increase the software lifecycle without additional costs

  • To correct security vulnerabilities and other flaws to prevent exploitation

Question 7 of 15

During an annual review of security policies, a company discovered that multiple incidents related to data leakage were a result of employees accidentally sending proprietary information to external contacts. Which of the following would be the BEST approach to mitigate this type of unintentional data loss?

  • Implement data loss prevention (DLP) systems that can detect and block sensitive data from being sent via email.

  • Increase the frequency of employee training on the acceptable use policy and proper data handling.

  • Review and update the procedures for external communications to include stricter guidelines.

  • Enforce more stringent role-based access controls on proprietary data.

Question 8 of 15

Which of the following actions is directly related to restricting access to network resources for a new employee who should only have limited permissions within the corporate environment?

  • Disabling unrelated features in the company's public web services

  • Enabling additional privileges to ensure full system functionality

  • Granting administrative access to network devices

  • Disabling unnecessary services on the employee's user account

Question 9 of 15

A company has been monitoring the performance of its network routers over a 2-year period and observed the following outages: Year 1 experienced 4 outages, totaling 16 hours, and Year 2 experienced 2 outages, totaling 12 hours. Assuming the network was operational for a total of 17,520 hours across both years, what is the Mean Time Between Failures (MTBF) for the network routers?

  • 2,500 hours

  • 2,920 hours

  • 3,004 hours

  • 2,752 hours

Question 10 of 15

A corporation employs external auditors who require access to the company's server infrastructure for a limited duration. The security policy enforces minimum necessary privileges and mandates that access credentials should expire immediately after the auditing task is completed. Which of the following practices should be implemented to comply with the security policy?

  • Generating non-expiring API keys for auditors to use during their review

  • Issuing a set of shared credentials that the audit team can use

  • Allocating time-restricted access tokens for server access

  • Creating permanent accounts with privileged access for each auditor

Question 11 of 15

A technology company is planning to outsource its customer data management to a third-party vendor. Before sharing any sensitive information, the company wants to ensure that the vendor is legally obligated to maintain the confidentiality of the data. Which document should the company require the vendor to sign?

  • MSA

  • SLA

  • NDA

  • MOU

Question 12 of 15

When establishing an effective security governance framework for an organization, which of the following is MOST essential to ensure alignment with business objectives and risk management strategies?

  • Recovery Point Objective (RPO) metrics

  • Password complexity standards

  • Information security policies

  • Annualized Rate of Occurrence (ARO) calculations

Question 13 of 15

As the lead security analyst at a financial institution, you have been tasked with evaluating the effectiveness of the implemented security controls. During the audit, you need to verify that access control policies are correctly enforced and that there are no deviations from the standard configurations across all servers. Which of the following audit practices would be the MOST effective for this purpose?

  • Conducting a configuration audit

  • Executing a financial audit

  • Performing a performance audit

  • Undertaking an operational audit

Question 14 of 15

Which type of disaster recovery site typically has infrastructure and utilities in place, but often requires additional configuration and data restoration before becoming operational?

  • Mobile site

  • Hot site

  • Warm site

  • Cold site

Question 15 of 15

A corporate network administrator is configuring access control on the switches to allow only authorized devices to connect to the LAN. The administrator wants to dynamically assign VLANs based on user identity and prevent unauthorized network access at the port level. Which of the following should be implemented?

  • Setting up Layer 7 firewall rules to assign VLANs

  • Configuring a WAF (Web Application Firewall) for VLAN assignment

  • Utilizing port security with MAC address filtering on the switches

  • Implementing 802.1X on the network switches