00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

Which access control method combines elements such as user role, the resource being accessed, and the current time to make an access decision?

  • Mandatory access control

  • Attribute-based access control

  • Role-based access control

  • Discretionary access control

Question 2 of 20

When implementing password protection measures, which of the following best describes a salt in cryptographic terms?

  • The act of repeatedly hashing a password multiple times to extend the amount of time required to hash passwords

  • An encryption method that dynamically changes the secret key based on a predefined algorithm

  • A random value added to each password prior to hashing to ensure that the resulting hash will be unique

  • A verification process to confirm that a digital message or document is intact and unaltered

Question 3 of 20

What describes an environment where the cloud provider dynamically manages the allocation of machine resources?

  • The cloud provider's automatic management of resource allocation for executing code without requiring the user to manage infrastructure

  • Users manually scale and manage virtual machine instances to meet the application's workload

  • Applications are constructed as a suite of small, independent services that perform specific business functions

  • A system where applications, dependencies, and systems are packaged together in a computing environment

Question 4 of 20

Which type of security control is designed to limit the damage and impact after a security incident has occurred?

  • Detective controls

  • Corrective controls

  • Compensating controls

  • Preventive controls

Question 5 of 20

As a benefit to its employees, your employer issues company purchased phones that the employee can use for both company business and personal use. Which device deployment model is the company using?

  • CYOD

  • BYOD

  • POCE

  • COPE

Question 6 of 20

What is the primary function of a hashing algorithm within the realm of cybersecurity?

  • To encrypt data so that it can be securely transmitted over public networks

  • To generate a unique 'fingerprint' of data that can be used to verify its integrity

  • To serve as the public key within a public-private key pair used for asymmetric encryption

  • To compress data to save storage space before transmitting over a network

Question 7 of 20

A security consultant is helping an organization to enhance the detection capabilities of unauthorized activities within its internal network. The organization's security strategy includes the deployment of Network Intrusion Detection Systems (NIDS) but also emphasizes minimizing the impact on network performance. Which deployment strategy should the consultant recommend?

  • Deploy NIDS sensors in inline mode to actively moderate and filter traffic.

  • Set up NIDS sensors to operate in stealth mode, invisible to network hosts and devices.

  • Place NIDS sensors in promiscuous mode to passively collect traffic without duplicating it.

  • Configure NIDS sensors in tap/monitor mode to replicate the network traffic non-intrusively.

Question 8 of 20

Which type of malware infects one computer then replicates itself to infect other vulnerable systems without the need to be executed by a user?

  • Trojan

  • Ransomware

  • Worm

  • Virus

Question 9 of 20

A cybersecurity team detects a prolonged and sophisticated cyber-espionage operation targeting critical infrastructure across several countries. The attackers are using zero-day exploits and custom malware to infiltrate secure systems and exfiltrate sensitive data. Which threat actor is MOST likely responsible for this attack?

  • Insider threat

  • Organized crime group

  • Nation-state actor

  • Hacktivist

Question 10 of 20

An organization is evaluating a new web application to ensure it supports high availability. The security architect wants to prioritize rapid, low-overhead promotion of the code from test to production with minimal manual steps or downtime. Which high-availability consideration is the architect addressing?

  • Resilience

  • Ease of deployment

  • Scalability

  • Availability

Question 11 of 20

What is primarily used to ensure a consistent and secure configuration across multiple systems within an organization?

  • Secure baselines

  • Antivirus signatures

  • Security incident reports

  • Firewall rules

Question 12 of 20

An attacker sets up a fraudulent website that perfectly mimics a company's webmail service and sends an email to an employee, tricking her into entering her username and password. The attacker successfully captures these credentials. Which of the following attacks can the adversary now directly perform using the captured username and password?

  • Credential replay

  • Session hijacking

  • DNS poisoning

  • Cross-site scripting (XSS)

Question 13 of 20

An organization is conducting a Business Impact Analysis. Which metric should be determined to establish the maximum time frame that a critical system can be disrupted before severe impact to business operations occurs?

  • Determining the maximum tolerable downtime for critical systems, otherwise known as the Recovery Time Objective, is essential for prioritizing their restoration.

  • Assessing the annual likelihood of a system failure occurring will forecast the potential interruptions in operations.

  • Establishing the data backup frequency is necessary for scheduling maintenance windows.

  • Calculating the cost of system outages per day can provide insight into potential financial losses.

Question 14 of 20

An organization is reviewing their network log policies to ensure they can effectively identify unauthorized access attempts. Which of the following logging details should the organization prioritize to BEST meet this objective?

  • Username associated with each session initiation

  • The total amount of data transferred during each session

  • Timestamps of data transfer

  • Record the source IP address for all incoming traffic

Question 15 of 20

Which of the following best represents the role of endpoint protection software as a system hardening technique in an organization's cybersecurity strategy?

  • To optimize the performance and speed of endpoint devices for better user experience

  • To manage user permissions and access control lists across the network

  • To backup data periodically and ensure disaster recovery for individual endpoint devices

  • To provide comprehensive security measures, such as antivirus and personal firewall capabilities, to individual devices within a network

Question 16 of 20

A regional healthcare organization regularly faces threats from severe weather events and has tasked the IT department with enhancing their business continuity plan. Leadership's primary goal is to ensure continuous operation of essential systems with no perceptible downtime in the event of a weather disaster. What update to the business continuity plan would BEST reflect leadership's priority for maintaining uninterrupted essential services?

  • Assemble a control center dedicated to managing communication and coordination during emergency responses

  • Enhance network infrastructure to manage a higher volume of data traffic during emergency situations

  • Outline strict targets for the time to restore essential services and schedules for critical data backups

  • Build and maintain a facility that is prepared and available on-demand for immediate operational takeover of essential systems

Question 17 of 20

A security administrator is implementing an encryption system that uses two distinct, but related keys. One key is used for encrypting data, and the other is used for decrypting it. What type of cryptography is being implemented?

  • Block cipher

  • Hashing

  • Asymmetric key cryptography

  • Symmetric key cryptography

Question 18 of 20

A financial organization's security team has detected a significant increase in phishing attempts against its employees. In response to this threat, the team has decided to employ a mechanism that verifies the identity of email senders and checks if the emails are from trusted sources before reaching the employees. Which type of security control is the team MOST likely implementing?

  • Managerial Controls

  • Physical Controls

  • Technical Controls

  • Operational Controls

Question 19 of 20

Your company has given you the responsibility to implement an appropriate access control scheme. The company wants to control access and permissions for employees based on job function. Which of the following should you use?

  • RBAC

  • DAC

  • RuBAC

  • MAC

Question 20 of 20

When conducting an assessment of a potential third-party service provider, what is the MOST critical factor to establish before proceeding with any formal engagement?

  • Due diligence

  • Enforcing a right-to-audit clause

  • Choosing a vendor based on the lowest bid

  • Implementing continuous vendor monitoring