00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

A company is revising its network security strategy to align with a Zero Trust model. Which of the following principles should be the foundational guideline for the company's revised approach to network security?

  • Restrict user privileges based on roles

  • Implement implicit trust zones within the network

  • Encrypt all data at rest

  • Never trust, always verify

Question 2 of 15

Which operational control involves identifying, containing, and recovering from security incidents?

  • Incident response

  • Access controls

  • Change management

Question 3 of 15

A security analyst implements intrusion detection sensors and automated log analysis tools. The primary purpose of these tools is to identify anomalies or disruptions in network traffic and system activities and then trigger an alert. Which type of security control does this implementation represent?

  • Detective

  • Deterrent

  • Preventive

  • Corrective

Question 4 of 15

What is the primary role of a generator within the security architecture of a data center?

  • To provide backup power in the event of a main power supply failure

  • To regulate the distribution of power to different circuits

  • To cool down the server racks and prevent overheating

  • To serve as a primary power source during peak operation times

Question 5 of 15

Which of the following best describes controls that are designed to establish security policies, procedures, and guidelines?

  • Operational Controls

  • Technical Controls

  • Physical Controls

  • Managerial Controls

Question 6 of 15

When an employee leaves the organization, the employee’s data is required to be maintained for a specific period of time. In what document within the company would this requirement be specified?

  • BCP

  • COOP

  • DRP

  • Retention policy

Question 7 of 15

An organization's server room entry is secured solely by numerical access codes, which has recently led to heightened concerns about the method's vulnerability to systematic guessing attempts. To increase the difficulty for perpetrators attempting to gain unauthorized entry, which enhancement should be taken?

  • Setting up an audible alert after multiple failed entry attempts.

  • Intermittent updates to numerical access codes.

  • Enhancing video surveillance around the entry area.

  • Installing a biometric authentication system.

Question 8 of 15

Which type of security control is designed to limit the damage and impact after a security incident has occurred?

  • Compensating controls

  • Detective controls

  • Preventive controls

  • Corrective controls

Question 9 of 15

What is the primary function of the RADIUS protocol when it is implemented on a network?

  • Facilitating the handshaking process in a TLS session

  • Distributing IP addresses to client devices

  • Load balancing traffic between servers

  • Centralizing control over who can connect to and use network services

Question 10 of 15

An organization is implementing security controls for a database that contains sensitive user information. Which state should primarily be considered when encrypting this database to protect the confidentiality of its contents?

  • Encrypted storage

  • Data in transit

  • Data in use

  • Data at rest

Question 11 of 15

A financial services company discovers that an employee's computer has been transmitting sensitive client data to an external server. The IT team suspects malware is involved and has identified a process that seems to be masquerading as a valid application. Which type of malware is designed to perform unauthorized actions while disguising itself as legitimate software?

  • Ransomware

  • Worm

  • Virus

  • Trojan

Question 12 of 15

Your organization is looking to enhance its disaster recovery capabilities to ensure business continuity after an unexpected event. Which type of site provides an on-demand, operational environment that can be quickly made ready to resume critical business functions with all of the necessary hardware and software?

  • Cold site

  • Hot site

  • Mobile site

  • Warm site

Question 13 of 15

A system administrator is setting up a web server for an internal development and testing environment. The administrator needs to enable HTTPS to simulate the production environment, but wants to avoid the cost and validation process of a public Certificate Authority (CA). Which of the following certificate types is the most suitable choice for this scenario?

  • Extended Validation (EV) certificate

  • Domain Validation (DV) certificate

  • Wildcard certificate

  • Self-signed certificate

Question 14 of 15

Which tool should an organization implement to enhance its capability to analyze and respond to security incidents across its IT infrastructure in a timely manner?

  • Establish a comprehensive strategy for secure handling and transfer of sensitive information

  • Install additional firewall rules for improved network perimeter defense

  • Implement a system that collates and analyzes security alerts and automates response actions

  • Deploy enhanced endpoint protection on all company devices

Question 15 of 15

A financial institution is updating its information security program. Who should be designated as the risk owner for financial data breaches?

  • The Data Owner

  • The Security Analyst

  • The IT Support Staff

  • The Chief Information Officer (CIO)