00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

CompTIA Security+ SY0-701 (V7) Logo
  • Free CompTIA Security+ SY0-701 (V7) Practice Test

  • 20 Questions
  • Unlimited
  • General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

An organization needs to prevent unauthorized external access to its internal network but still allow employees to access external resources necessary for their work. Which security technology should the organization implement to best achieve this goal?

  • Install physical access controls to restrict entry to the organization's facilities.

  • Use encryption to secure sensitive data transmitted over the network.

  • Implement a firewall to control and filter network traffic based on security rules.

  • Deploy an intrusion detection system to monitor network activities for suspicious behavior.

Question 2 of 20

A security manager implements a facial recognition system at the entrance to a data center. The system scans each individual's face and only unlocks the door for authorized personnel. Which of the following BEST describes this type of security control?

  • Detective

  • Deterrent

  • Corrective

  • Preventive

Question 3 of 20

As the policy administrator for an organization that has adopted a Zero Trust Architecture, you must update an access-control rule for a senior developer who needs to connect to an isolated development enclave that hosts highly sensitive source-code repositories. The developer already authenticates with multi-factor authentication (MFA). According to Zero Trust principles, which additional step should you perform immediately before granting the session?

  • Validate the device's posture to ensure it meets current security baselines

  • Analyze the developer's recent activity for behavioral anomalies

  • Require just-in-time approval through the change-management system

  • Restrict the developer's access to the environment strictly during office hours

Question 4 of 20

A financial institution wants to reduce the risk of sensitive customer data exfiltration by employees. Which of the following would be the MOST effective measure to implement?

  • Enforcing the use of strong encryption protocols for data at rest.

  • Implementing monitoring and blocking of suspicious data transfers.

  • Enabling biometric authentication on all data systems.

  • Disabling unused physical and logical service ports company-wide.

Question 5 of 20

Which of the following is the BEST description of the purpose of version control in the context of change management and security?

  • To automatically update documentation and diagrams when changes are made

  • To facilitate collaboration between different teams and departments

  • To quickly identify and resolve issues caused by recent changes

  • To manage and control software code, configurations, and other artifacts

Question 6 of 20

An employee in your organization has been consistently leaving his workstation unlocked when stepping away for short breaks. This behavior might expose the company to security threats. As part of security awareness practices, how should this issue be best addressed to prevent potential unintentional insider threats?

  • Installing a firewall on the employee's workstation

  • Requiring biometric authentication before accessing the company systems

  • Limiting physical access to the office to authorized personnel only

  • Conducting regular training sessions on operational security

Question 7 of 20

A company aims to minimize security risks resulting from unintentional actions by its employees. Which managerial control should the company implement to achieve this goal?

  • Implement multi-factor authentication for system access

  • Use surveillance cameras to monitor workplace activities

  • Install firewalls to prevent unauthorized network access

  • Provide comprehensive security awareness training to employees

Question 8 of 20

An administrator needs to securely access and manage servers located in an isolated, high-security network segment. To minimize the attack surface, direct administrative access from the general corporate network is prohibited. Which of the following should be used to provide a controlled and monitored entry point for this purpose?

  • VPN concentrator

  • Jump server

  • Proxy server

  • Load balancer

Question 9 of 20

A financial services company wants to ensure its critical customer-facing web application is always accessible and performs well, even during periods of high user activity. The primary goals are to prevent any single server failure from causing an outage and to efficiently distribute incoming user requests across the server farm. Which of the following solutions BEST meets both of these requirements?

  • A failover cluster combined with a load balancer.

  • Deploying a software-defined wide area network (SD-WAN).

  • Implementing RAID-10 on all web servers.

  • A single, powerful server with virtualization enabled.

Question 10 of 20

Your company has decided to implement a new cloud-based Customer Relationship Management (CRM) system. Compliance rules state that all backups of the CRM data must be encrypted. The Chief Information Security Officer asks for a recommendation that delivers both strong encryption and streamlined, centrally managed key handling. Which encryption approach best meets these requirements?

  • Cloud provider's managed Key Management Service (KMS) with server-side encryption

  • Encrypt only sensitive database fields by using public key infrastructure

  • Whole-disk encryption on the CRM application servers

  • Manually encrypt backups with AES-256 and store the keys in a spreadsheet

Question 11 of 20

A financial services company has historically maintained a very conservative security posture, prioritizing stability over innovation. Recently, executive leadership decided to launch a new fintech platform to attract a younger demographic. This new venture uses cutting-edge technologies that are considered higher risk. This strategic shift will MOST likely require a direct reassessment of which of the following?

  • Recovery Point Objective (RPO)

  • Risk tolerance

  • Annualized Rate of Occurrence (ARO)

  • Acceptable Use Policy (AUP)

Question 12 of 20

A large multinational corporation is experiencing a persistent wave of cyber-attacks characterized by website defacements and data leaks. These incidents are accompanied by messages expressing opposition to the corporation's involvement in various international projects. What type of threat actor is most likely responsible for these activities?

  • Organized crime

  • Nation-state

  • Hacktivist

  • Insider threat

Question 13 of 20

An IT security manager has noticed a recent uptick in confidential information being leaked through casual conversations on the company's authorized instant messaging (IM) platform. While reviewing the IM security policies, what should the manager implement to reduce the risk of data leakage through IM chats?

  • Enforce end-to-end encryption for all IM communications

  • Configure Data Loss Prevention (DLP) policies on the IM system

  • Assign dedicated staff to manually review IM message logs for sensitive data

  • Restrict file permissions for users on the network

Question 14 of 20

Which is a primary purpose of aggregating logs from multiple systems into a centralized logging solution?

  • To prevent users from accessing or modifying the log files on their local systems

  • To encrypt log files for secure archival on a cloud storage service

  • To ease centralized analysis by correlating events from multiple systems

  • To increase the storage capacity on individual systems by offloading logs

Question 15 of 20

Firewall logs exclusively show outbound traffic and therefore do not provide sufficient data to detect potential inbound intrusion attempts.

  • False

  • True

Question 16 of 20

What is the primary function of the RADIUS protocol when it is implemented on a network?

  • Load balancing traffic between servers

  • Distributing IP addresses to client devices

  • Facilitating the handshaking process in a TLS session

  • Centralizing control over who can connect to and use network services

Question 17 of 20

A group of attackers targets a corporation's network because they disagree with its environmental practices. Which motivation best describes their actions?

  • Blackmail

  • Philosophical/political beliefs

  • Financial gain

  • Data exfiltration

Question 18 of 20

A security administrator is finalizing a resiliency plan for a server room that houses several critical systems. The primary requirement is to prevent data corruption by allowing the servers to shut down gracefully in the event of a sudden, complete power outage. Which of the following solutions should the administrator implement to BEST meet this specific requirement?

  • Diesel generator

  • Surge protector

  • Redundant Power Supply (RPS)

  • Uninterruptible Power Supply (UPS)

Question 19 of 20

A security administrator is in the process of defining the initial set of security configurations that will be applied to all new devices in the company. Which of the following is the BEST method to achieve this objective?

  • Applying a standardized security configuration guide to the devices.

  • Setting up a proper disposal and decommissioning process for devices.

  • Regularly patching the devices as part of routine maintenance.

  • Enforcing full-disk encryption on all new devices.

Question 20 of 20

A development team is building a new event-driven web service and wants to focus purely on writing code instead of provisioning servers. They need a cloud execution model in which the provider automatically provisions, scales, and bills for compute resources on demand. Which architecture model best meets this requirement?

  • The cloud provider's automatic management of resource allocation for executing code without requiring the user to manage infrastructure

  • Applications are constructed as a suite of small, independent services that perform specific business functions

  • Users manually scale and manage virtual machine instances to meet the application workload

  • A system where applications, dependencies, and supporting files are packaged together in a computing environment