00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

CompTIA Security+ SY0-701 (V7) Logo
  • Free CompTIA Security+ SY0-701 (V7) Practice Test

  • 20 Questions
  • Unlimited
  • General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

Which type of policy specifies the proper use of IT resources, including computers, networks, and data within an organization?

  • Business Continuity Plan

  • Acceptable Use Policy (AUP)

  • Software Development Lifecycle (SDLC) Policy

  • Disaster Recovery Plan

Question 2 of 20

What is the primary purpose of implementing security zones within a network infrastructure?

  • To simplify network management by grouping similar device types

  • To provide redundant network paths for load balancing purposes

  • To increase the performance and speed of the network by reducing congestion

  • To isolate network segments by security levels and enforce distinct policies

Question 3 of 20

A security administrator is implementing hardening measures on a critical server to reduce the risk of compromise. The administrator's primary concern is preventing an attacker who has successfully phished a user's password from gaining administrative access. Which of the following controls would be the MOST effective mitigation for this specific threat?

  • Applying the latest security patches to the operating system

  • Enforcing multifactor authentication (MFA) on all administrative accounts

  • Implementing a host-based firewall to restrict network traffic

  • Enforcing a strong password complexity and rotation policy

Question 4 of 20

An organization has recently implemented a monitoring system that flags unusual behavior on its network and alerts the security team for potential security breaches. This system was established after a recent incident where unauthorized access went undetected for an extended period. Based on this scenario, what type of control has the organization most likely implemented?

  • Compensating Control

  • Preventive Control

  • Detective Control

  • Corrective Control

Question 5 of 20

Which of the following statements best characterizes symmetric encryption when compared with asymmetric encryption?

  • It removes the need for any secure key-exchange process between communicating parties.

  • It relies on two mathematically related keys, one public and one private, for all cryptographic operations.

  • It uses a single secret key that both the sender and receiver use to encrypt and decrypt data.

  • It is primarily used to generate digital signatures that verify data integrity and origin.

Question 6 of 20

A systems administrator needs to implement a stringent application control policy on a server that handles sensitive data. The policy must ensure that only a specific set of pre-approved applications can be executed, and all other applications are blocked by default. Which of the following security controls would be the MOST effective to achieve this goal?

  • Application allow list

  • Application deny list

  • Network Access Control (NAC)

  • Anomaly-based intrusion detection system

Question 7 of 20

What does RPO define in a disaster recovery strategy?

  • The amount of data an organization can afford to lose, measured in time.

  • The time to restore IT systems after a disruption.

  • The procedures used to handle security incidents.

  • The strategies implemented to prevent unauthorized access to systems.

Question 8 of 20

A security team is evaluating new perimeter security solutions to replace their traditional firewall. The primary goal is to gain visibility into and control over the specific web applications being used (e.g., social media, streaming services) and to block threats that leverage application-layer protocols. Which of the following firewall types is specifically designed to meet these requirements?

  • Circuit-level gateway

  • Stateless packet-filtering firewall

  • Next-generation firewall (NGFW)

  • Stateful inspection firewall

Question 9 of 20

What aspect of data retention policies is MOST crucial for ensuring compliance with legal and regulatory frameworks?

  • The categorization of data as sensitive, confidential, or public

  • The length of time that data must be stored before it can be destroyed or archived

  • The storage costs associated with different types of data

  • The encryption strength used to protect data during the retention period

Question 10 of 20

You recently purchased a new home. One of your first actions after taking ownership is to install a monitored alarm system that will sound a siren and notify a security company if an intruder enters the house. This system is an example of which type of security control?

  • Detective

  • Deterrent

  • Preventive

  • Corrective

Question 11 of 20

An organization needs to prevent unauthorized external access to its internal network but still allow employees to access external resources necessary for their work. Which security technology should the organization implement to best achieve this goal?

  • Implement a firewall to control and filter network traffic based on security rules.

  • Use encryption to secure sensitive data transmitted over the network.

  • Deploy an intrusion detection system to monitor network activities for suspicious behavior.

  • Install physical access controls to restrict entry to the organization's facilities.

Question 12 of 20

In an initiative to proactively defend against emerging cybersecurity threats, your company has started receiving updates from a threat intelligence service. As a security analyst tasked with enhancing the organization's defensive strategies, what is the most effective action to take when operationalizing this new intelligence?

  • Use the intelligence solely to inform the incident response team to plan and prepare for potential future attacks.

  • Update definitions for firewalls and intrusion prevention systems with indicators of compromise derived from the threat intelligence updates.

  • Create a dedicated dashboard for real-time alerts that utilizes threat intelligence data to track potential incidents.

  • Subscribe to a variety of additional threat intelligence providers in order to cross-reference and verify the new intelligence.

Question 13 of 20

A security team needs to grant external auditors temporary access to specific cloud servers for a one-week audit. Company policy dictates that access must follow the principle of least privilege and be revoked automatically after the audit. Which of the following privileged access management (PAM) techniques BEST meets these requirements?

  • Implement ephemeral credentials that expire after the audit period.

  • Create permanent, role-based accounts for each member of the audit team.

  • Issue a shared password that provides access to all necessary servers.

  • Provision non-expiring API keys restricted to the auditors' IP addresses.

Question 14 of 20

An organization's security policy mandates that any implemented security solutions must not interfere with network traffic or introduce potential points of failure, but the company still wants to be alerted to any suspicious activities on the network. Which of the following would BEST achieve this goal?

  • Implementing an Intrusion Detection System

  • Deploying a firewall with deep packet inspection

  • Installing an Intrusion Prevention System

  • Using a Content Filter

Question 15 of 20

The IT department of Enhanced Solutions is evaluating their current security posture compared to the industry's best practices to improve their security measures. They are assessing the difference between their current state and the desired state of security. Which process are they most likely engaging in?

  • Security baselining

  • Gap analysis

  • Impact analysis

  • Risk assessment

Question 16 of 20

What does the term 'impossible travel' signify in the context of security monitoring?

  • A type of race condition vulnerability exploited during security checks

  • A security measure taken after multiple unsuccessful login attempts from different locations

  • A warning sign that a user account is accessed from two distant places in a period too short for regular travel, hinting at credential misuse

  • A method by which session hijacking attacks are performed on multiple accounts at once

Question 17 of 20

When implementing hardening techniques on a company's main database server to minimize its attack surface, which of the following measures should be taken FIRST?

  • Implement account lockout policies after several failed login attempts.

  • Update the server to the latest stable OS version and apply all available security patches.

  • Conduct a vulnerability scan to identify and fix security flaws.

  • Configure the firewall to allow only essential traffic.

Question 18 of 20

A merged entity is facing a challenge integrating its central authentication service, based on a well-established directory protocol, with a newly acquired company's applications that authorize users through a popular web-based authorization standard. To achieve a cohesive authentication process across both existing and newly included systems, what is the appropriate solution to adopt?

  • Employ a federation service to bridge the two distinct user authentication systems for seamless operation.

  • Enforce strict two-factor authentication for users of both systems to enhance overall security posture.

  • Amend password management policies to standardize user credentials across all systems and applications.

  • Establish an encrypted channel between the two systems to securely map user accounts from one to the other.

Question 19 of 20

An attacker is attempting to impersonate a trusted entity by presenting a fabricated network packet that appears to be part of an ongoing communication. Which kind of attack does this scenario best describe?

  • Replay

  • Phishing

  • Forgery

  • Spoofing

Question 20 of 20

An organization wants to improve its physical security posture by enhancing the verification process at the entrance of a secure data center. Which of the following options is the BEST solution to ensure that only authorized individuals gain entry?

  • Installing surveillance cameras at all entry and exit points.

  • Installing a biometric access control system that requires fingerprint verification.

  • Deploying a combination lock on the main door of the data center.

  • Distributing key cards to all employees with access to the data center.