00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

A development team is implementing a 'shift-left' security strategy to identify vulnerabilities early in the software development lifecycle (SDLC). The team wants to analyze the application's source code for security flaws, such as potential SQL injection and buffer overflows, without executing the program. Which of the following techniques should the team use?

  • Web application firewall (WAF)

  • Fuzzing

  • Dynamic Application Security Testing (DAST)

  • Static Application Security Testing (SAST)

Question 2 of 15

A company has a policy to repurpose its storage devices internally before considering disposal. When preparing storage devices that were used for sensitive projects for repurposing within a less critical department, which measure should be employed to minimize the risk of data exposure?

  • Degauss the drives to disrupt the magnetic field and render the data unreadable.

  • Perform a standard antivirus scan to ensure the absence of malware.

  • Conduct a secure erasure conforming to a stipulated industry standard for data sanitization.

  • Reformat the drives using the quick format option to prepare for immediate reuse.

Question 3 of 15

Your company has issued laptops to its employees for remote work. During a routine security audit, you identify that these laptops come with pre-installed software from the manufacturer that is not being used by the employees. What concerns should you have regarding this software from a security perspective?

  • The software could be useful for productivity, hence poses no significant risk.

  • This software may contain vulnerabilities that could be exploited by attackers because they often go unmanaged and unpatched.

  • The employees may use this software regularly, which could lead to potential data leaks.

  • This software can take up disk space, but it does not pose any security concerns.

Question 4 of 15

A healthcare organization based in California is expanding its services to a neighboring state with distinct data privacy laws. To ensure compliance with the new regional regulations, which element of effective security governance should the organization prioritize updating?

  • Enhancing physical security measures at the new location

  • Implementing a global encryption standard across all offices

  • Updating the Information Security Policies to include state-specific compliance requirements

  • Revising the Incident Response plan based on national guidelines

Question 5 of 15

A company's proprietary application is critical for daily operations, but it runs on an operating system that no longer receives vendor updates. The company's IT team is currently unable to upgrade the system or migrate the application due to compatibility issues. What is the most effective risk mitigation strategy the IT team should implement to secure the legacy system against potential threats?

  • Conduct regular security audits on the system to ensure compliance with security policies

  • Implement network segmentation and restrict the system's network connectivity to essential services

  • Increase security monitoring specifically targeting the unsupported system to detect anomalies

  • Encourage users to employ stronger passwords for system access

Question 6 of 15

A security analyst is reviewing data handling policies for their organization. They need to ensure that data stored on hard drives, SSDs, and backup tapes is properly encrypted. Which of the following data states correctly describes this type of data?

  • Data in use

  • Data in process

  • Data at rest

  • Data in transit

Question 7 of 15

A company is implementing multifactor authentication to enhance security for their VPN access. Which of the following provides the BEST example of a 'Something you are' factor?

  • Hardware token

  • Fingerprint scan

  • Access badge

  • Personal Identification Number (PIN)

  • Password

  • Voice recognition

Question 8 of 15

Your team is in the process of developing a new web application. As a security specialist, you are tasked with performing an assessment to identify potential security flaws. Which technique would allow you to analyze the behavior of the application during execution to identify unexpected outcomes, vulnerabilities or security violations?

  • Conducting a run-time evaluation of the web application with a variety of inputs and analysing the response

  • Inspecting and interpreting web application firewall logs to identify potential security issues

  • Utilizing a configuration compliance scanner to ensure that the servers meet the company's baseline security standards

  • Performing a detailed review of the source code of the web application before it is compiled

Question 9 of 15

An organization’s IT department noticed that specific entries that should be present in the security logs are missing, and there are sudden gaps in the logs’ regular time intervals. In the absence of any scheduled maintenance or known service disruptions, what is the MOST likely explanation for this disparity?

  • The logging service crashed due to a software error, thus not recording data.

  • Log generation was paused due to insufficient storage space.

  • Logs were deliberately deleted or altered by an attacker.

  • The log retention policy automatically purged older log entries.

Question 10 of 15

A company has various security policies and controls in place. Which of the following is the BEST action to take to ensure these policies and controls remain effective and aligned with current threats?

  • Conduct regular reviews and updates of security policies and controls

  • Install the latest antivirus software on all company devices

  • Provide comprehensive security training to all employees on a weekly basis

  • Limit user privileges to the minimum necessary for job performance

Question 11 of 15

An international company must keep its clients’ personal information in regions where data is collected. Which approach enforces location-based requirements for data storage?

  • Rely on customized encryption keys stored in a different territory

  • Use a hosting service physically located in each region to store local records

  • Deploy widely distributed servers that automatically copy data to any node

  • Protect data with advanced credentials and a robust login policy

Question 12 of 15

A company's primary data center located in a hurricane-prone area has just experienced a significant storm, leading to a sustained power outage and compromised physical infrastructure. The company relies on a combination of on-site back-ups and replication to an off-site data center for their disaster recovery strategy. Given these details, which of the following would BEST ensure the continuation of business operations during this event?

  • Implementing incremental backups until the primary data center is restored and operational.

  • Waiting until the primary data center is restored to resume critical business operations.

  • Activating the business continuity plan which includes failing over to the off-site data center.

  • Restoring operations from onsite backups as soon as connectivity is re-established.

Question 13 of 15

What is the common title for senior management members responsible for overseeing data in their domain?

  • Data protector

  • Data manager

  • Data owner

  • Data administrator

Question 14 of 15

Which of the following is the BEST description of the purpose of version control in the context of change management and security?

  • To manage and control software code, configurations, and other artifacts

  • To quickly identify and resolve issues caused by recent changes

  • To automatically update documentation and diagrams when changes are made

  • To facilitate collaboration between different teams and departments

Question 15 of 15

What type of attack involves manipulating a system into using a less secure encryption protocol to then exploit weaker cryptographic implementation?

  • Buffer overflow attack

  • Replay attack

  • Downgrade attack

  • Man-in-the-middle attack