00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

Data stored on a SAN and not being processed is in which state?

  • Data at rest

  • Data in motion

  • Data in use

  • Data in transit

Question 2 of 15

What is the main function of Group Policy within a Windows domain environment?

  • Remote installation and configuration of software applications across all domain-joined desktops

  • Monitoring real-time performance data for servers within a domain

  • Synchronization of user files across different devices within the domain

  • Centralized management and configuration of users' settings and security policies

Question 3 of 15

Your company has recently rolled out a new security awareness training program focused on recognizing social engineering attacks. To ensure the effectiveness of the training, what is the MOST effective method to evaluate employee understanding and application of the training content?

  • Publishing a quarterly newsletter highlighting social engineering threats

  • Including a quiz at the end of the training session

  • Conducting unannounced phishing simulation campaigns

  • Unannounced network scans after training completion

Question 4 of 15

An organization's network has been infected with a software that propagates itself across computers, encrypting files and demanding payment for the decryption key. Which of the following BEST describes this type of malicious code?

  • Worm

  • Ransomware

  • Virus

  • Trojan

Question 5 of 15

A junior administrator suggests configuring the company's patch management system to automatically deploy all security patches to production systems immediately upon release from vendors. They argue this will minimize the window of exposure to new threats. Which of the following is the BEST reason to advise against this policy?

  • Untested patches can introduce new bugs, cause system instability, or create conflicts with existing software, potentially leading to operational downtime.

  • Automatic patching prevents security teams from properly documenting the changes in the system.

  • Applying patches immediately consumes excessive network bandwidth during business hours.

  • Vendors often release faulty patches and recall them within the first 24 hours.

Question 6 of 15

Which process typically initiates the creation of user accounts and the assignment of access rights within a company's systems?

  • Role changes

  • Offboarding

  • Onboarding

  • Maintenance

Question 7 of 15

Which access control model requires continuous verification and context-aware authorization to ensure the security of resources?

  • Mandatory Access Control (MAC)

  • Role-Based Access Control (RBAC)

  • Discretionary Access Control (DAC)

  • Zero Trust Model (ZTM)

Question 8 of 15

An enterprise is upgrading its data center's physical security. The security audit revealed that while they have reliable electronic access controls for data center entry points, there is no measure in place to identify tailgating when these access points are used. Which physical security enhancement should be employed to mitigate this risk?

  • Upgrading to biometric authentication systems

  • Installing mantraps at the entry points

  • Adding turnstiles at the access points

  • Increasing surveillance camera coverage at entry points

Question 9 of 15

An organization has noticed that employees are accessing sensitive files unrelated to their responsibilities. The company wants to ensure that users can access only the data required for their tasks. Which of the following methods would BEST address this issue?

  • Implementing role-based access control

  • Applying network segmentation

  • Enforcing multi-factor authentication

  • Encrypting all sensitive files

Question 10 of 15

What is the primary goal of employing uniform configuration standards across a company's technological environment?

  • To diversify system configurations, which in turn makes it harder for attackers to exploit vulnerabilities.

  • To tailor each system’s settings for user preference, thereby improving individual productivity.

  • To maintain a consistent set of configurations for enhanced security and simplified management.

  • To allow systems to operate independently of one another, minimizing the impact of network-wide updates.

Question 11 of 15

An organization is planning to implement a new information security policy and wants to ensure all employees understand and formally acknowledge their responsibilities under the policy. Which of the following methods is the MOST effective to meet this objective?

  • Distribute the policy through an electronic signature platform requiring all employees to acknowledge by signing digitally.

  • Host an organization-wide informational session where the policy is explained and have employees verbally acknowledge after the session.

  • Post the new information security policy on the company’s internal website and assume all employees will comply.

  • Send out a company-wide email with the new policy and ask employees to reply if they do not understand the policy.

Question 12 of 15

Upon discovering a data breach involving unauthorized access to the customer records system, what is the PRIMARY action the security team should focus on according to standard security protocols?

  • Start documenting the details of the breach and response actions taken.

  • Notify the company's legal team and prepare for public disclosure.

  • Prioritize the review of security logs to trace the origin of the attack.

  • Immediately isolate affected systems to stop the spread of the breach.

Question 13 of 15

What is the significance of implementing an expiration time frame on user passwords within an organization's security policy?

  • It allows users to reuse their passwords more frequently, reducing the cognitive load.

  • It increases password complexity requirements automatically over time.

  • It decreases the number of password-related support calls to the IT department.

  • It reduces the risk of long-term use of compromised credentials by mandating regular updates.

Question 14 of 15

Which of the following best describes why an organization must be aware of local and regional regulations when developing their security program?

  • To apply universal standards of cybersecurity that are recognized globally.

  • To ensure compliance with specific legal requirements that may not be covered by national or global standards.

  • To simplify the security program management by adhering to broader compliance laws.

  • To avoid the need for customizing security measures for different company branches.

Question 15 of 15

During an incident response investigation, analysts discover Cyrillic comments and Russian-language debug paths embedded in the source code of malware used in a sophisticated breach. Which of the following BEST explains why this evidence alone cannot be taken as definitive proof that a Russian government agency conducted the attack?

  • Nation-state attackers always encrypt their production builds, so any readable strings must come from reuse by third-party developers.

  • Threat actors can deliberately embed linguistic and cultural markers as false flags to mislead investigators.

  • Open-source libraries automatically remove national language clues, so variable names are never reliable for attribution.

  • Russian is the default language in most compiler environments, so these markers are inserted automatically during compilation.