00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

An organization implements a set of policies that outline employee responsibilities and expected behaviors regarding information security. What type of security control is this an example of?

  • You selected this option

    Preventive control

  • You selected this option

    Detective control

  • You selected this option

    Directive control

  • You selected this option

    Corrective control

Question 2 of 15

Which form of access control is specifically designed to adapt in real-time to the perceived threat level, improving the security stance by continuously evaluating the risk and context associated with user access requests?

  • You selected this option

    Role-based access control (RBAC)

  • You selected this option

    Mandatory access control (MAC)

  • You selected this option

    Discretionary access control (DAC)

  • You selected this option

    Adaptive Policy-driven access control

Question 3 of 15

An IT staff member is tasked with the day-to-day management of information assets, including implementing backup and recovery procedures and maintaining security controls, but does not have authority to make policy decisions regarding the data. What role does this staff member hold in the organization?

  • You selected this option

    Data Owner

  • You selected this option

    Data Controller

  • You selected this option

    Data Processor

  • You selected this option

    Data Custodian

Question 4 of 15

During a risk assessment a company determines their acceptable level of risk. To achieve a desired objective, it is decided that the company can deviate a certain amount from the determined level of risk. This deviation is called what?

  • You selected this option

    Risk tolerance

  • You selected this option

    Risk appetite

  • You selected this option

    Risk register

  • You selected this option

    Risk identification

Question 5 of 15

In a scenario where a regional healthcare provider is implementing a strategy to segregate its administrative, clinical, and guest networks to both minimize its attack surface and comply with health information privacy regulations, which technology should be utilized to not only separate the segments but also enforce distinct security policies and control inter-segment traffic?

  • You selected this option

    Border Gateway Protocol (BGP) for routing control

  • You selected this option

    Transport Layer Security (TLS) for secure communications

  • You selected this option

    Quality of Service (QoS) configuration for traffic prioritization

  • You selected this option

    Next-generation firewall (NGFW)

Question 6 of 15

Personnel is considered the weakest part of security. To combat this, you developed a security awareness training program for your company. Employee training is considered what type of security control?

  • You selected this option

    Technical

  • You selected this option

    Preventive

  • You selected this option

    Physical

  • You selected this option

    Detective

Question 7 of 15

A playbook includes a collection of pre-defined rules, actions, and recommendations to automate response and remediation activities for common security incidents.

  • You selected this option

    True

  • You selected this option

    False

Question 8 of 15

During a post-incident review meeting, a security analyst is tasked with improving the incident response process based on recent events. Which of the following actions would BEST ensure a positive impact on future incident response capabilities?

  • You selected this option

    Updating the Incident Response Plan with specific improvements identified from the incident.

  • You selected this option

    Revising all security training materials without assessing their relevance to the incident.

  • You selected this option

    Conducting a review of historical incident trends without making changes to existing procedures.

  • You selected this option

    Deciding that the existing Incident Response Plan is sufficient since the incident was eventually contained.

Question 9 of 15

During an incident response, a security analyst has identified a server that may have been compromised. The analyst decides to take an image of the server's hard drive for further analysis. Which of the following is the MOST critical step to ensure the integrity of the investigation?

  • You selected this option

    Physically secure the server to prevent further access.

  • You selected this option

    Document the process and the individuals involved in handling the server.

  • You selected this option

    Limit access to the server by updating access control lists.

  • You selected this option

    Generate a digital hash of the server's hard drive image.

Question 10 of 15

The software section of the security team has been asked to review the source code for a program being developed. They are being asked to look for any coding errors or possible security vulnerabilities. This is what type of application security review?

  • You selected this option

    Secure coding

  • You selected this option

    Fuzzing

  • You selected this option

    Static code analysis

  • You selected this option

    Dynamic code analysis

Question 11 of 15

An organization discovers that its trade secrets are being sold to competing businesses. What type of threat actor is MOST likely behind this activity, aiming to gain a competitive edge through underhanded tactics?

  • You selected this option

    Hacktivist

  • You selected this option

    Nation-state

  • You selected this option

    Organized crime

  • You selected this option

    Unskilled attacker

Question 12 of 15

Which role best describes the function of the protocol dedicated to automating the checking of security configurations, vulnerabilities, and policy compliance?

  • You selected this option

    Logging and analyzing network traffic for potential security threats

  • You selected this option

    Enabling secure communications between different network entities

  • You selected this option

    Automated assessment, monitoring, and policy compliance evaluation

  • You selected this option

    Coordination and negotiation of network protocols for data transfer

Question 13 of 15

A company has implemented a new policy requiring IT management to conduct security reviews of all vendors before onboarding them. The reviews need to ensure that the vendors are adhering to the same security standards as the company. Which of the following actions is MOST effective for assessing the vendors' adherence to these standards?

  • You selected this option

    Reviewing the vendors' privacy policies.

  • You selected this option

    Conducting third-party security audits of the vendors.

  • You selected this option

    Comparing the Service Level Agreements (SLAs) to the company's standards.

  • You selected this option

    Examining product data sheets for security features.

Question 14 of 15

Your organization operates in the healthcare industry in the United States, and is planning to deploy a new patient management system. Which of the following is the MOST APPLICABLE approach to ensure compliance with industry-specific security requirements?

  • You selected this option

    Implement security controls in accordance with HIPAA regulations

  • You selected this option

    Use the NIST cybersecurity framework as a guideline

  • You selected this option

    Adhere strictly to the GDPR for all data processing activities

  • You selected this option

    Follow the SOX requirements for security compliance

Question 15 of 15

Which hardware-based security solution is specifically designed to securely generate, store, and manage cryptographic keys for a wide variety of applications?

  • You selected this option

    Key Management System

  • You selected this option

    HSM

  • You selected this option

    Secure Enclave

  • You selected this option

    TPM