00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

Which of the following is the BEST method to protect credit card information in a database while still allowing for customer data analysis?

  • Use data masking to obscure credit card numbers in the database

  • Tokenize the credit card information within the database

  • Encrypt the entire database with a strong encryption algorithm

  • Hash the credit card information and store the hash value in the database

Question 2 of 20

A data-center operations manager is performing a business impact analysis and needs to estimate how long a critical database cluster typically remains functional before an unexpected hardware fault requires repair. The vendor specification lists an MTBF of 75,000 hours for each node. In this context, what does MTBF stand for, and what reliability information does it provide?

  • Maximum Time Before Failure, indicating the longest time a system can function before it fails

  • Minimum Time Before Failure, reflecting the shortest time a system might operate before encountering an issue

  • Mean Time Between Failures, measuring the average time operational between system breakdowns

  • Mean Time Before Fix, representing the average time to repair a system after a failure

Question 3 of 20

A medium-sized enterprise has decided to implement a comprehensive disaster recovery plan. Given the critical nature of their transactional database that receives updates nearly every minute, which of the following backup frequencies would best balance the need for up-to-date data restoration capabilities with resource utilization?

  • Differential backups every 4 hours without scheduled full backups

  • Full backups at the end of every week

  • Full backups every 24 hours only

  • Incremental backups every 2 hours with daily full backups

Question 4 of 20

You work for a company that processes customers' personal information as part of its business operations. This part of operations presents a risk to the company. What is this type of risk called?

  • Residual risk

  • Control risk

  • Inherent risk

  • Tolerated risk

Question 5 of 20

A corporation needs to secure its data while it is sent from the main office to a distant branch. To achieve confidentiality and effective management of cryptographic keys, which protocol should be adopted?

  • WEP

  • PPTP

  • HTTPS

  • IPsec

Question 6 of 20

During an acquisition, your company is tasked with evaluating the security measures of the company to be acquired. Which type of assessment is MOST appropriate to determine that the company meets your security requirements?

  • Quantitative risk analysis

  • Internal self-assessment

  • External penetration testing

  • Due diligence review

Question 7 of 20

As the security analyst for a financial institution, you uncover repeated failed login attempts against a user account during off-hours. The source addresses resolve to a country where the company has no employees or offices. Based on the threat-actor attribute of location, which type of actor is most likely responsible?

  • Shadow IT personnel using unapproved cloud services

  • An unskilled attacker (script kiddie) located on the internal network

  • An external threat actor operating outside the organization

  • An insider threat from a current employee with authorized access

Question 8 of 20

A system that centralizes the storage, analysis, and reporting of log data from various sources within an organization's IT infrastructure performs a preventive role in the security control framework.

  • This assertion is correct as preventing incidents is a key goal of centralizing and analyzing log data, which is a characteristic of preventive controls.

  • This assertion is inaccurate because the primary function of centralizing and analyzing log data is for detection and investigation purposes, matching the definition of a detective control.

Question 9 of 20

Which statement BEST describes an organization's obligation to comply with a country's information-security laws and regulations when it conducts business within that country's borders?

  • They apply to any organization that conducts business or processes data within the country, regardless of where the organization is headquartered.

  • Compliance is required only if the organization stores data physically inside the country's borders; remote or cloud-based activities are exempt.

  • An organization can choose which nation's laws it will follow, provided it documents the decision in a written risk acceptance.

  • They apply only to organizations that are incorporated in that country; foreign firms may rely solely on their home-country laws.

Question 10 of 20

An organization wishes to scrutinize network traffic to detect anomalies, like substantial data transfers during off-peak hours. Which solution is most fitting for generating insights into such network traffic behaviors?

  • Security Information and Event Management (SIEM) solution, a comprehensive approach to security management that aggregates and analyzes security events,

  • NetFlow, a network protocol for collecting IP traffic information and monitoring network flow,

  • Simple Network Management Protocol (SNMP) traps, a protocol used for managing network equipment and handling event notifications,

  • Antivirus software, designed to detect, prevent, and remove malware,

Question 11 of 20

Your organization is implementing a new policy that requires the decommissioning of server hardware after a certain period of continued operation to mitigate risks related to aging infrastructure. As part of the asset management team, what is the most important policy update needed to ensure hardware disposal aligns with best security practices?

  • Mandatory replacement of hardware components based on performance degradation.

  • Implementation of an asset tagging system with emphasis on frequency of hardware use.

  • Asset inventory updates to record exact age and expected decommission dates of hardware.

  • Creating a decommissioning schedule based solely on the importance of data the hardware holds.

Question 12 of 20

What type of attack involves manipulating a system into using a less secure encryption protocol to then exploit weaker cryptographic implementation?

  • Man-in-the-middle attack

  • Buffer overflow attack

  • Replay attack

  • Downgrade attack

Question 13 of 20

An organization needs a backup facility that can quickly take over full operations with minimal downtime in the event of a disaster. Which type of site should they implement?

  • Warm site

  • Reciprocal site

  • Cold site

  • Hot site

Question 14 of 20

A system administrator has been tasked with securing data at rest for a company's document storage server, ensuring maximum confidentiality. Which of the following solutions would be the MOST appropriate to accomplish this task?

  • Utilize a VPN with robust encryption for accessing documents remotely.

  • Implement full disk encryption on the document storage server drive.

  • Encrypt each document individually with a unique key.

  • Ensure Secure Socket Layer (SSL)/Transport Layer Security (TLS) is enabled on the server.

Question 15 of 20

A multinational company has recently launched a cloud service platform and is considering introducing a bug bounty program to enhance its security measures. What is the most important reason for the company to integrate a bug bounty program into its vulnerability management process?

  • To ensure the company's compliance with international cybersecurity regulations and standards.

  • To focus specifically on mitigating zero-day exploits by having them reported through the program.

  • To promote the company's dedication to transparency and foster trust among its user base.

  • To uncover otherwise undetected vulnerabilities by leveraging the collective efforts of the global security research community.

Question 16 of 20

An organization has recently experienced a security breach where multiple endpoints were remotely controlled by an unauthorized entity, leading to the unauthorized use of system resources for mining cryptocurrency. Which type of malware is MOST likely responsible for this incident?

  • Worm

  • Logic Bomb

  • Botnet

  • Ransomware

Question 17 of 20

During preliminary negotiations for a new project, your company needs to ensure that strategic plans, trade secrets, and innovative processes are kept confidential when shared with a potential partner. Which type of legal contract is most appropriate to enforce confidentiality before sharing any detailed project information?

  • Employment Agreement

  • Master Services Agreement

  • Non-Disclosure Agreement

  • Letter of Intent

Question 18 of 20

A network administrator receives reports that users are unable to access the company’s internal file server. The administrator verifies that the server is operational and the network infrastructure is functional. What is the BEST mitigation technique to ensure the users regain access?

  • Decommission the current file server and migrate to a new one.

  • Enhance real-time monitoring of network traffic to the file server.

  • Review and adjust the access control list (ACL) for the file server.

  • Patch the file server’s operating system and applications to the latest versions.

Question 19 of 20

A company is looking to protect its customers' credit card information within its database while still using the data for transactional processes. Which method ensures the original data cannot be derived from the information stored in the database without access to a separate mapping system?

  • Data Masking with Fixed Mask Characters

  • Tokenization

  • One-way Hashing

  • Format-Preserving Encryption

Question 20 of 20

As part of the vendor selection process for a new data storage provider, you must gauge the vendor's security posture and compliance. Which document will be most effective in providing standardized queries to the vendors about their security controls and practices?

  • Master Service Agreement (MSA)

  • Service-Level Agreement (SLA)

  • Security Questionnaire

  • Business Partners Agreement (BPA)