00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

Which password policy most effectively enhances security by ensuring passwords are difficult to guess or crack?

  • Encouraging users to create passwords using easily memorable phrases.

  • Implementing a maximum password age of 90 days to ensure regular password changes.

  • Allowing users to reuse their previous six passwords to simplify password management.

  • Enforcing passwords to be at least 12 characters long and include uppercase letters, lowercase letters, numbers, and special characters.

Question 2 of 15

During a penetration test, what term best describes an environment where the tester has no prior knowledge of the target system or network?

  • Partially Known Environment

  • White Box Environment

  • Reconnaissance Environment

  • Unknown Environment

Question 3 of 15

Which of the following statements BEST describes who is responsible for securing the application layer (for example, patching application code and mitigating application-level vulnerabilities) under the cloud shared-responsibility model?

  • The customer is always responsible, regardless of the service model.

  • Responsibility shifts by service model: customers secure the application layer in IaaS (and generally in PaaS), but the provider secures it in SaaS.

  • In IaaS the provider secures applications, whereas in SaaS the customer does.

  • The cloud service provider is always responsible, no matter which service model is used.

Question 4 of 15

Which of the following BEST minimizes the attack surface of a server deployed in a public cloud environment?

  • Performing a weekly vulnerability scan to identify potential security weaknesses

  • Implementing strong encryption for data transmitted to and from the server

  • Regularly applying all available security patches to the operating system and applications

  • Limiting the number of running services on the server to only those necessary for its function

Question 5 of 15

This email protocol provides a mechanism for email senders and receivers to determine whether or not a given message is legitimately from the sender, and what to do if it isn't. It relies on the results of checking the messages against the policies defined in the Sender Policy Framework and DomainKeys Identified Mail records.

  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

  • Security Policy Framework (SPF)

  • DomainKeys Identified Mail (DKIM)

  • Protected Domain Marks Recording (PDMR)

Question 6 of 15

Which term describes the requirement to control access to data based on the physical location of the user accessing the data or the location of the data processing?

  • Data sovereignty

  • Geolocation restrictions

  • Data classification

  • Data residency

Question 7 of 15

Which of the following BEST describes a security group in an environment using a centralized user login systems such as Active Directory?

  • A list of recommended security settings that can be applied to a system or software.

  • A protocol used for encrypting traffic between a client and a server.

  • A collection of user accounts that can be used to assign permissions for accessing resources.

  • A virtual firewall that controls the inbound and outbound traffic to and from cloud resources.

Question 8 of 15

A company wants to reduce the number of login IDs and passwords their employees need to remember to access various company resources. Which authentication scheme should a security administrator recommend to achieve this?

  • SSO

  • TACACS+

  • 802.1X

  • RADIUS

Question 9 of 15

As a system administrator for a medium-sized corporation, you notice an unusual email being circulated within the company. The email in question appears to be from the CEO requesting urgent wire transfers to a new vendor due to an alleged internal system audit. What immediate action should you take to mitigate the risks?

  • Reply to the email asking for more details about the vendor and the audit.

  • Comply with the email directives and perform the wire transfer to the new vendor.

  • Verify the request via a direct phone call to the CEO and alert the IT security team.

  • Forward the email to other department heads to quickly fulfill the CEO's request.

Question 10 of 15

Which of the following best describes the concept of high availability in the context of security architecture?

  • The ability of a system to handle increased loads by distributing tasks across multiple servers

  • Ensuring operational performance for a higher than normal period by means of redundancy and failover mechanisms

  • Designing systems in a way that reduces their energy consumption to ensure longer operating times

  • The duplication of critical components of a system with the intention of increasing reliability of the system

Question 11 of 15

A freshly recruited member of a marketing firm is in the orientation phase and requires guidance on the organization's expectations regarding the use of digital assets and communications networks. To communicate the rules of engagement and the potential sanctions for contravention, which document should be introduced to the recruit?

  • Document emphasizing guidelines for digital resource usage

  • Guidelines for resuming operations after an unplanned event

  • Response protocol for security breaches

  • Organizational roadmap for general security management

Question 12 of 15

Which of the following practices enhances the security of user accounts?

  • Setting passwords to expire every 90 days

  • Using complex passwords that mix case, numbers, and special characters

  • Allowing users to choose simple passwords for ease of remembering

  • Using the same password across multiple systems for consistency

Question 13 of 15

A security analyst discovers a minor, non-critical vulnerability in a production web application's login form. The development team has already created a patch to fix the issue. According to security best practices, what is the MOST appropriate next step for deploying this patch?

  • Submit the patch for review, testing, and approval through the formal change management process.

  • Activate the incident response plan because a security vulnerability was discovered.

  • Initiate a new Software Development Lifecycle (SDLC) to manage the patch development and deployment.

  • Deploy the patch directly to the production server to resolve the vulnerability immediately.

Question 14 of 15

When managing operations across multiple countries, each with their own unique privacy and data handling laws, what is the BEST approach a company can adopt to ensure ongoing compliance in its handling of personal customer data?

  • Enhancing employee awareness through training programs

  • Adopting a comprehensive data inventory and retention policy

  • Regularly engaging with third-party auditors for compliance checks

  • Establishing generic organizational policies for data handling

Question 15 of 15

Which type of network attack involves overwhelming a target service with excessive traffic to the point where the service is unable to respond to legitimate requests?

  • Domain Name System (DNS) attack

  • Brute force

  • Credential replay

  • Distributed Denial-of-Service (DDoS)