Labor Day Flash Sale: 30% off Today Only!

7 hours, 31 minutes remaining!
00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

Which of the following is a physical device used to securely generate, store, and manage cryptographic keys, offering high levels of security for encryption processes?

  • Hardware Security Module

  • Secure Enclave

  • Key Management System

  • Trusted Platform Module

Question 2 of 15

What type of security exercise involves a discussion-based activity where team members analyze and resolve hypothetical scenarios to enhance cybersecurity preparedness?

  • Simulation

  • Tabletop exercise

  • Fire drill

  • Automated report training

Question 3 of 15

An organization wants to gather intelligence on attack techniques by implementing a system that mimics vulnerable services and records interactions with potential intruders. Which of the following would BEST achieve this goal?

  • Honeypot

  • Firewall configured with logging

  • Vulnerability scanner

  • Intrusion detection system

Question 4 of 15

A security administrator is creating a document that provides non-mandatory recommendations and best practices for employees on how to securely handle sensitive company data. Which of the following control documents is the administrator creating?

  • Policy

  • Procedure

  • Standard

  • Guideline

Question 5 of 15

A government agency requires the setup of an ultra-secure communication system for handling top-secret information. Which of the following represents the most appropriate approach to achieve the maximum level of security through physical isolation?

  • Installing a high-end firewall with strict access control lists.

  • Creating multiple VLANs to segregate top-secret communication from other data traffic.

  • Setting up the system on a completely air-gapped network.

  • Using dedicated cabling to connect systems while still being part of the internet.

Question 6 of 15

A digital forensics investigator is collecting evidence from a compromised workstation. Which action best maintains the chain of custody?

  • Encrypt the evidence to protect it from unauthorized access.

  • Use write-blocking devices to prevent data alteration.

  • Analyze the evidence on the original workstation to maintain context.

  • Record the date, time, and individuals who handle the evidence.

Question 7 of 15

You are working as a cybersecurity analyst for a 3rd party contractor. You have been brought in by an organization who believes they were hacked by a malicious actor. Their internal security team has hired you to determine the impact of the unauthorized access. At the time of the intrusion there were 5 servers online: DEV_APP_001, PRD_APP_002, PRD_DB_008, STG_DB_004 and FINANCE_009. What step should you take to begin the analysis?

  • Create a snapshot backup and then reformat each server

  • Create a new server running Kali Linux and make necessary firewall changes to allow it to access all the listed servers

  • Begin analyzing each server after prioritizing them based on the data stored on each server

  • Begin hardening all servers immediately before the impact analysis starts

Question 8 of 15

Considering your current network security setup only provides notifications when potential security breaches occur, which enhancement would allow the system to not just detect but also proactively counteract malicious traffic?

  • Bolster the organization's data loss prevention (DLP) strategies

  • Enhance the cryptographic assurance using public key infrastructure (PKI)

  • Incorporate additional security information and event management (SIEM) features

  • Implement a system with automatic threat mitigation capabilities

Question 9 of 15

A software development company wants to allow its users to log into a third-party code repository from their in-house development platform. The company aims to facilitate this without sharing user credentials with the third-party service. Which protocol is best suited to allow the company's platform to request access to the third-party service on behalf of the user?

  • Open Authorization (OAuth)

  • Lightweight Directory Access Protocol (LDAP)

  • Remote Authentication Dial-In User Service (RADIUS)

  • Terminal Access Controller Access-Control System Plus (TACACS+)

Question 10 of 15

A large organization has implemented several security measures to protect its network infrastructure. As part of their continuous monitoring strategy, they want to ensure that any unauthorized access or anomalies in their network traffic are quickly identified and investigated. Which of the following security measures would best serve this purpose?

  • Increase frequency of anti-virus software updates on all endpoints.

  • Conduct regular security training sessions for all network administrators.

  • Implement an Intrusion Detection System (IDS) to monitor network traffic.

  • Deploy additional firewalls to segment network traffic.

Question 11 of 15

An administrator needs to securely access and manage servers located in an isolated, high-security network segment. To minimize the attack surface, direct administrative access from the general corporate network is prohibited. Which of the following should be used to provide a controlled and monitored entry point for this purpose?

  • Jump server

  • Load balancer

  • Proxy server

  • VPN concentrator

Question 12 of 15

A company is evaluating options for remote employees to securely access the corporate network. Which of the following solutions would provide the BEST security for sensitive corporate data while maintaining reliable connectivity?

  • Utilizing remote access software without two-factor authentication for user convenience

  • Installing a jump server that remote employees can connect to before accessing the corporate network

  • Implementing a Virtual Private Network (VPN) with strong encryption standards for remote connections

  • Allowing remote access through a basic tunneling protocol with no additional encryption

Question 13 of 15

In an effort to streamline client interaction processes, a business is transitioning to a sophisticated platform designed for this purpose. The analytics division requires permissions to generate reports and review client data, while the account management division needs the ability to engage with and alter client records. What is the BEST strategy for assigning the appropriate level of system access in accordance with each division's responsibilities?

  • Institute a policy where access is determined by the seniority of the personnel within the organization

  • Grant all divisions the same level of access to simplify management of the new platform

  • Utilize a predefined set of roles that are specific to user job functions to regulate access within the platform

  • Allow division heads to grant access as they see fit for their respective teams

Question 14 of 15

Which of the following best describes the process where a system or individual proves their identity by providing credentials to a verifying entity?

  • Authentication

  • Accounting

  • Authorization

  • Multifactor

Question 15 of 15

When using security controls, at times you will need additional controls to make up for the shortcoming of existing controls. This is called what kind of control?

  • Compensating

  • Preventive

  • Detective

  • Corrective