00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

Which of the following BEST describes the primary purpose of attestation in a security governance context?

  • To provide a detailed analysis of potential risks to the organization's assets

  • To detect and respond to security breaches in real time

  • To forecast potential future threats to the organization's security posture

  • To provide assurance that security controls are effectively in place as per policies and standards

Question 2 of 15

You are the system administrator for your company. You notice that a large number of accounts have been locked out due to incorrect password entries. This is most likely an indicator of which type of malicious attack?

  • Keylogger

  • Ransomware

  • Brute force

  • Trojan

Question 3 of 15

During a security awareness training session, you want to ensure employees are equipped to identify fraudulent emails attempting to obtain sensitive company data by impersonating a trusted source. Which type of security threat should the training primarily focus on?

  • Spear phishing

  • Vishing

  • Phishing campaigns

  • Tailgating

Question 4 of 15

Your company is deploying a new set of servers acquired from a hardware provider. What is the BEST initial step to ensure these devices do not introduce vulnerabilities into the company's network?

  • Review and verify the server firmware to ensure it's up-to-date and from a legitimate source.

  • Enable full disk encryption on all servers as part of the initial configuration.

  • Perform a comprehensive vulnerability scan on all servers immediately after they're connected to the network.

  • Conduct penetration testing on the servers to identify and exploit potential security weaknesses.

Question 5 of 15

During the analysis phase of an incident, an analyst is tasked with determining the scope of a suspected breach on several servers. Which data source will MOST likely provide the comprehensive information required to assess the activities on the affected servers?

  • Packet captures

  • Operating system-specific security logs

  • Vulnerability scans

  • Firewall logs

Question 6 of 15

A company wants to minimize the exposure of sensitive customer credit card data within its e-commerce environment. Which of the following data protection strategies would BEST reduce the risk of credit card data breaches while maintaining the ability to perform transactional operations?

  • Tokenization

  • Encryption

  • Masking

  • Geolocation

Question 7 of 15

What enables an organization to have an accurate inventory of all hardware, software, and data assets to support effective security monitoring and rapid incident response?

  • Vulnerability scans

  • Asset tracking

  • Patch management

  • Data retention policies

Question 8 of 15

A company's IT department is tasked with protecting sensitive client data stored on their servers. To minimize the risk of unauthorized data exposure, the department needs to implement a solution that ensures the data is unreadable without the proper decryption key, even if it falls into the wrong hands. Which method should be used to secure the data on these servers?

  • Full-Disk Encryption

  • Encrypting the email communications containing client data

  • Using database encryption for only the tables with sensitive client data

  • Implementing file-level encryption for each client record individually

Question 9 of 15

Which of the following statements BEST explains why a network firewall alone cannot provide the same level of protection as encryption for data stored on a network file server?

  • A firewall enforces access rules for network traffic, but only encryption renders the stored data unreadable to unauthorized users, so both controls are required to protect data at rest.

  • Neither firewalls nor encryption protect data at rest; only physical security controls such as locks and guards can do so.

  • Encryption secures data moving across the network, whereas a firewall secures all data that resides on the server's drives.

  • A properly configured firewall automatically encrypts any files transmitted or stored behind it, eliminating the need for separate data-at-rest encryption.

Question 10 of 15

What is the primary purpose of performing a packet capture in the context of network security?

  • To restrict access to network resources based on IP addresses

  • To collect and analyze network traffic for security monitoring and investigative purposes

  • To increase the bandwidth and performance of the network

  • To provide network users with a secure method of file transfer

Question 11 of 15

A network administrator is deploying an inline intrusion prevention system (IPS). Security policy dictates that if the IPS software crashes or the appliance loses power, no traffic may bypass inspection. Which of the following failure modes should the administrator configure on the IPS to satisfy this requirement?

  • Fail-open

  • Failover

  • Fail-safe

  • Fail-closed

Question 12 of 15

Which identity and access management solution creates a single point of failure whereby compromising one set of user credentials could let an attacker access every connected application the user is authorized for?

  • IPSec virtual private network (VPN) tunnel

  • Discretionary access control (DAC) model

  • Single sign-on (SSO) service

  • Network segmentation using VLANs

Question 13 of 15

A company is preparing to roll out a major update to one of its critical applications. The update includes new features and security patches. Prior to deployment, the security team wants to ensure that they can quickly revert to the previous stable version in case of unexpected problems with the new release. Which method would BEST ensure that they can manage and control application versions effectively?

  • Update the disaster recovery plan to include steps for reverting application updates.

  • Implement a version control system to manage application updates and rollbacks.

  • Deploy an automated patch management tool to handle version updates.

  • Create regular manual backups of the application's installation directory.

Question 14 of 15

What is the primary purpose of applying masking to sensitive data within an organization's IT environment?

  • To encrypt data with a cryptographic key to ensure only authorized users can access the content

  • To obscure specific data elements within a database to hide sensitive information from unauthorized viewers

  • To irreversibly transform data into a cryptographic string to verify its integrity

  • To physically separate sensitive data from the rest of the organization's data environment

Question 15 of 15

Which type of attack involves attempting possible combination of letters, numbers, and symbols until the correct password is found, often leading to unauthorized system access?

  • Brute force attack

  • Phishing

  • Dictionary attack

  • Spoofing