00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

Which of the following best describes the primary purpose of an Acceptable Use Policy (AUP) in an organization?

  • To outline acceptable and unacceptable use of the organization's information systems and resources.

  • To mandate minimum encryption key lengths for all stored data.

  • To define the specific disciplinary actions that will be taken for any security violation.

  • To document the steps required to restore business operations after a disaster.

Question 2 of 20

Your organization is looking to enhance its disaster recovery capabilities to ensure business continuity after an unexpected event. Which type of site provides an on-demand, operational environment that can be quickly made ready to resume critical business functions with all of the necessary hardware and software?

  • Warm site

  • Cold site

  • Hot site

  • Mobile site

Question 3 of 20

A network administrator is configuring a new firewall. To prioritize security, the firewall is set up to block all network traffic if the device experiences a critical error or power loss. This configuration is an example of which concept?

  • Fail-closed

  • Fail-on

  • Fail-safe

  • Fail-open

Question 4 of 20

During a third-party risk assessment of potential cloud service providers, what topic should be emphasized in the questionnaire to ascertain the provider’s ability to maintain the confidentiality and integrity of your organization’s data?

  • Yearly employee turnover rates within the provider’s IT department

  • Percentage of the provider’s IT budget allocated to research and development

  • Disaster recovery time objectives for service continuity

  • Techniques and protocols for data encryption in transit and at rest

Question 5 of 20

Which of the following is an example of a possession factor that could be used for multi-factor authentication?

  • A password

  • A hardware authentication token

  • Eye color

  • A mobile app authorization request

Question 6 of 20

What is the primary goal of employing uniform configuration standards across a company's technological environment?

  • To diversify system configurations, which in turn makes it harder for attackers to exploit vulnerabilities.

  • To allow systems to operate independently of one another, minimizing the impact of network-wide updates.

  • To maintain a consistent set of configurations for enhanced security and simplified management.

  • To tailor each system’s settings for user preference, thereby improving individual productivity.

Question 7 of 20

When establishing a Business Partners Agreement with a new vendor, what element is most crucial to ensure the protection of sensitive data?

  • Terms of conflict resolution processes

  • Clearly defined security requirements

  • Specific definitions of the parties involved

  • Regularly scheduled review cycles

Question 8 of 20

What best describes a risk assessment that is conducted to evaluate the potential impact of a new business initiative before its launch?

  • Continuous

  • Recurring

  • One-Time

  • Ad Hoc

Question 9 of 20

Which system should an organization implement to effectively correlate and analyze security event data across multiple sources for enhanced incident detection and response times?

  • A compliance reporting tool

  • A system that provides centralized event and log data analysis

  • A network sniffer

  • A threat intelligence platform

Question 10 of 20

When considering the security implications of hardware and software inventory management, which of the following is a direct consequence of NOT regularly updating the inventory of an organization's computing resources?

  • Challenges in provisioning adequate resources for new employees

  • Increased difficulty in managing software licenses and compliance

  • Heightened risk of security breaches due to unmanaged or unknown assets

  • Difficulties in the physical retrieval of devices for maintenance tasks

Question 11 of 20

Which encryption method ensures that all data stored on a computer's physical disk is secured, even if the disk is transferred to another machine?

  • File-level encryption

  • Container encryption

  • Volume encryption

  • Full-disk encryption

Question 12 of 20

An organization implements a set of policies that outline employee responsibilities and expected behaviors regarding information security. What type of security control is this an example of?

  • Directive control

  • Preventive control

  • Corrective control

  • Detective control

Question 13 of 20

An organization needs a backup facility that can quickly take over full operations with minimal downtime in the event of a disaster. Which type of site should they implement?

  • Hot site

  • Reciprocal site

  • Cold site

  • Warm site

Question 14 of 20

Which of the following is the BEST approach for an organization to ensure ongoing effective security compliance for international data protection regulations?

  • Implementing a strong password policy across the organization

  • Conducting regular internal and external compliance audits

  • Encrypting all data stored on the organization's servers

  • Limiting data access to a few key employees

Question 15 of 20

A system administrator deployed a patch to a critical virtual server. Shortly after the deployment, the server began experiencing intermittent crashes. The administrator needs to revert the server to its state immediately before the patch was applied to minimize downtime. Which of the following is the FASTEST method to achieve this?

  • Restore from the most recent full backup.

  • Rebuild the server from the base image.

  • Revert to the latest snapshot.

  • Perform an incremental backup restoration.

Question 16 of 20

Which data type specifically refers to information whose collection, storage, and transmission are governed by external laws or industry regulations such as HIPAA for medical records or PCI-DSS for credit-card information?

  • Public

  • Trade secret

  • Intellectual property

  • Regulated

Question 17 of 20

A security analyst implements intrusion detection sensors and automated log analysis tools. The primary purpose of these tools is to identify anomalies or disruptions in network traffic and system activities and then trigger an alert. Which type of security control does this implementation represent?

  • Preventive

  • Detective

  • Deterrent

  • Corrective

Question 18 of 20

During an audit, a security administrator discovers that several accounting users can create and delete network shares even though they only need to read and update invoices stored on a file server. Which corrective action BEST enforces the principle of least privilege when the accounts are remediated?

  • Enable single sign-on (SSO) so users authenticate through the corporate identity provider

  • Upgrade each account to local administrator to eliminate future permission requests

  • Strip any permissions that are not required for invoice processing and leave only the necessary read/write rights

  • Apply time-based login restrictions that block the users from accessing the file server after business hours

Question 19 of 20

What does the term 'complexity' relate to in the context of security operations?

  • The number of users that have access to a system

  • The difficulty level of an attacker required to exploit a system

  • The extent to which systems, processes, and technologies are interconnected and intricate, potentially making them harder to secure

  • The level of encryption used to protect data

Question 20 of 20

Which of the given options is a hashing algorithm that creates a 128 bit fixed output?

  • SHA1

  • MD5

  • RIP128

  • SHA2