00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

A healthcare institution recently hired you to review their security measures. You discover that they have not been monitoring access to publicly available information that could be used for social engineering attacks. Which type of reconnaissance is the institution most vulnerable to?

  • Active scanning

  • Active reconnaissance

  • Passive reconnaissance

  • Penetration testing

Question 2 of 15

A company is reviewing their security controls for critical infrastructure and needs to decide on the deployment of a mechanism that should ensure maximum uptime. However, during a network outage or a device failure, they want the mechanism to prioritize network availability over strict security to maintain business operations. Which of the following configurations would BEST align with the company's requirements?

  • Implement a fail-open mechanism on security devices.

  • Configure a high availability cluster for all critical systems.

  • Deploy an additional layer of intrusion prevention systems.

  • Set all security devices to a fail-close setting.

Question 3 of 15

Which of the given options is a hashing algorithm that creates a 128 bit fixed output?

  • SHA2

  • MD5

  • SHA1

  • RIP128

Question 4 of 15

A security audit of a financial application reveals a critical vulnerability. The application first checks a user's account balance to authorize a transfer (time-of-check) and then, in a separate step, processes the withdrawal (time-of-use). An attacker found that by sending multiple, simultaneous requests, they could withdraw funds exceeding their actual balance because the balance was not locked during the transaction. Which of the following vulnerabilities does this scenario describe?

  • Race condition

  • Privilege escalation

  • SQL injection

  • Buffer overflow

Question 5 of 15

In the context of security control types, which of the following BEST describes the primary purpose of an Intrusion Detection System (IDS)?

  • Preventive control

  • Detective control

  • Corrective control

  • Deterrent control

Question 6 of 15

Users within a company are experiencing intermittent inability to access critical file-sharing services, while internet connectivity is unaffected. The IT department notes unusually high network traffic directed at the servers during these outages. What is the MOST likely cause behind the file-sharing service being inaccessible?

  • A DDoS attack on the company's file-sharing servers.

  • Switching infrastructure failure leading to intermittent network partitioning.

  • A misconfigured ACL blocking access to the file-sharing service.

  • An ARP spoofing attack causing content redirection.

Question 7 of 15

A company's mobile workforce requires a method of authentication that significantly reduces the likelihood of unauthorized access in the event of credential theft. Which of the following types of authentication factors is the BEST to implement to meet this requirement?

  • Token-based authentication

  • Biometric authentication

  • Physical location verification

  • One-time codes sent through message protocols

Question 8 of 15

An organization's security department has detected an ongoing attack that is highly sophisticated, seems to be targeting specific data related to national defense, and is suspected to have significant financial backing. Which type of threat actor is MOST likely responsible for this attack?

  • Insider threat

  • Unskilled attacker

  • Hacktivist

  • Nation-state

Question 9 of 15

A company is migrating its services to a cloud provider and needs to determine which security controls are managed by them and which are managed by the provider. Which document should they refer to for this information?

  • The cloud provider's incident response plan

  • The cloud provider's responsibility matrix

  • The cloud provider's service level agreement

  • The company's internal policies

Question 10 of 15

An IT staff member is tasked with the day-to-day management of information assets, including implementing backup and recovery procedures and maintaining security controls, but does not have authority to make policy decisions regarding the data. What role does this staff member hold in the organization?

  • Data Owner

  • Data Custodian

  • Data Processor

  • Data Controller

Question 11 of 15

What type of access control restricts user access to systems based on the current time?

  • Time-of-day restrictions

  • Role-based access controls

  • Attribute-based access controls

  • Least privilege

Question 12 of 15

During a security awareness training session, you want to ensure employees are equipped to identify fraudulent emails attempting to obtain sensitive company data by impersonating a trusted source. Which type of security threat should the training primarily focus on?

  • Vishing

  • Tailgating

  • Phishing campaigns

  • Spear phishing

Question 13 of 15

A company's web server suddenly experiences an overwhelming amount of traffic, causing legitimate users to be unable to access the website. Investigation reveals that the traffic surge is due to a flood of network requests with spoofed IP addresses, indicating a possible DDoS attack. Which type of DDoS attack is most likely occurring if the attack traffic is magnified by the attackers using public network services without the need for a botnet?

  • Reflected DDoS attack

  • Ping flood attack

  • SYN flood attack

  • Amplified DDoS attack

Question 14 of 15

What best describes a risk assessment that is conducted to evaluate the potential impact of a new business initiative before its launch?

  • Ad Hoc

  • Continuous

  • Recurring

  • One-Time

Question 15 of 15

Which of the following best ensures that an application has not been modified by an unauthorized party and truly comes from the claimed source?

  • Setting secure cookies on the application

  • Enabling multifactor authentication on the application login

  • Installing the latest antivirus software on the system where the application is running

  • Implementing code signing certificates