00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

CompTIA Security+ SY0-701 (V7) Logo
  • Free CompTIA Security+ SY0-701 (V7) Practice Test

  • 20 Questions
  • Unlimited
  • General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

Which of the following algorithms is a symmetric encryption algorithm?

  • DSA

  • Diffie-Hellman

  • RSA

  • Twofish

Question 2 of 20

A medium-sized organization is expanding rapidly and requires a solution to streamline the creation and management of user accounts across multiple services, including email, cloud storage, and internal databases. As the security operations manager, you decide to implement a tool to automate these repetitive tasks. Which of the following solutions would be the MOST appropriate to achieve this objective?

  • Password manager

  • Simple Network Management Protocol (SNMP) manager

  • Security Information and Event Management (SIEM) system

  • Identity and Access Management (IAM) solution

Question 3 of 20

Why is it important to change default passwords when configuring new devices or systems?

  • To ensure the device remains under warranty by complying with manufacturer policies

  • To allow the device to receive automatic security updates for firmware

  • To guarantee compatibility with other devices on the network through standardized passwords

  • To prevent unauthorized access by those who might know the commonly used default passwords

Question 4 of 20

As the IT security specialist for your company, you have noticed an unusual increase in employees reporting suspicious emails that attempt to lure them into providing their login credentials. The email claims that the company's email system is undergoing maintenance and employees need to log in to a special portal to continue having access to their emails. Which type of attack is most likely occurring?

  • Phishing

  • Smishing

  • Vishing

  • Typosquatting

Question 5 of 20

A security administrator at a small warehouse needs a control that allows staff to monitor and record any unauthorized after-hours entry so they can alert law enforcement rather than physically confronting intruders. Which physical control would BEST meet this requirement?

  • Surveillance cameras

  • Keypad door locks

  • Mantrap

  • Bollards

Question 6 of 20

What type of NIDS commonly uses artificial intelligence and data mining to identify malicious network traffic?

  • Anomaly-based NIDS

  • Filter-based NIDS

  • Rule-based NIDS

  • Signature-based NIDS

Question 7 of 20

An IT department wants to reduce the time it takes to grant new employees access to necessary systems and applications by automating this process. Which use case of automation and scripting best addresses this need?

  • Security groups

  • Ticket creation

  • Continuous integration and testing

  • User provisioning

Question 8 of 20

For an upcoming security audit, a junior administrator must apply basic hardening steps to fifty Windows and Linux workstations that will be issued to remote employees. Which of the following actions represents a fundamental system-hardening control that should be completed before deployment?

  • Enable guest accounts on each system to simplify initial user logins.

  • Install all vendor-supplied security updates and critical patches.

  • Configure the host firewall to allow all outbound ports by default.

  • Create a local administrator account with the same strong password on every workstation.

Question 9 of 20

A system administrator has been notified that an audit has found certain files containing proprietary source code to be accessible by all employees through a shared network drive. The source code should only be accessible to members of the development team. To align with best practices for permissions management, which of the following actions should the system administrator implement FIRST to remediate this issue?

  • Set up an alert system to monitor file access patterns and flag any unauthorized attempts

  • Initiate a company-wide training on the importance of data confidentiality

  • Modify the permissions on the files to restrict access solely to the development team

  • Disable the shared network drive until a full user account review can be performed

Question 10 of 20

A company's new data protection policy mandates that all databases containing customer personally identifiable information (PII) must be encrypted. Following this directive, the IT department enables transparent data encryption (TDE) on the relevant SQL servers. Which statement accurately describes the relationship between the policy and the encryption?

  • The policy and the encryption are both examples of operational controls.

  • The encryption is a compensating control that replaces the need for a policy.

  • The policy is a technical control, and the encryption is a managerial control.

  • The policy is a managerial control that guides the implementation of the technical control (encryption).

Question 11 of 20

A developer is building a new web application with a user registration form. To prevent attackers from submitting malicious scripts or SQL commands through the form fields, which of the following security techniques should be prioritized for implementation on the server-side?

  • Implementation of least privilege in code execution

  • Input validation

  • Secure cookie implementation

  • Static code analysis

Question 12 of 20

A security analyst is reviewing a report from a recent vulnerability scan that identified over 200 issues across various systems, including web servers, databases, and network switches. To manage the remediation process effectively, the analyst groups the vulnerabilities based on common characteristics, such as the type of weakness (e.g., SQL injection, cross-site scripting) and the affected technology stack. What is this process of categorizing vulnerabilities called?

  • Vulnerability scoring

  • Vulnerability classification

  • Vulnerability indexing

  • Vulnerability enumeration

Question 13 of 20

A network administrator is hardening a new web server and must configure the firewall to allow secure web traffic. Which TCP port should the administrator open to allow HTTPS connections by default?

  • 80

  • 3389

  • 443

  • 143

Question 14 of 20

Upon discovering a data breach involving unauthorized access to the customer records system, what is the PRIMARY action the security team should focus on according to standard security protocols?

  • Start documenting the details of the breach and response actions taken.

  • Notify the company's legal team and prepare for public disclosure.

  • Immediately isolate affected systems to stop the spread of the breach.

  • Prioritize the review of security logs to trace the origin of the attack.

Question 15 of 20

Your organization is a U.S.-based e-commerce retailer that sells products to customers in the European Union and California and allows employees to work remotely from Brazil. The security manager must design a privacy compliance program that minimizes legal exposure while keeping operations as simple as possible. Which of the following strategies BEST accomplishes this goal?

  • Rely exclusively on user consent pop-ups to satisfy all international privacy obligations.

  • Maintain separate privacy policies and technical controls for each jurisdiction but enforce them only in the local office located there.

  • Implement a single privacy program that meets the most stringent requirements across GDPR, CCPA/CPRA, and LGPD, and apply it to all data processing worldwide.

  • Comply only with U.S. federal privacy laws because the company is incorporated in the United States.

Question 16 of 20

An administrator is configuring permissions for a new network share according to the principle of least privilege. Members of the accounting department must be able to add and edit files in the folder. Members from the auditing and sales departments should only be able to review the contents. Which set of permissions should the administrator assign to the accounting, auditing, and sales groups, respectively?

  • Full control for accounting, Read & execute for auditing, Write for sales

  • Write for accounting, Read for auditing and sales

  • Read & execute for accounting, Write for auditing, Modify for sales

  • Modify for accounting, Read & execute for auditing, Read for sales

Question 17 of 20

When considering the security implications of hardware and software inventory management, which of the following is a direct consequence of NOT regularly updating the inventory of an organization's computing resources?

  • Increased difficulty in managing software licenses and compliance

  • Challenges in provisioning adequate resources for new employees

  • Heightened risk of security breaches due to unmanaged or unknown assets

  • Difficulties in the physical retrieval of devices for maintenance tasks

Question 18 of 20

A company's primary file server was encrypted by a ransomware attack, making all files inaccessible. The IT department responded by isolating the server, removing the malware, and successfully restoring the data from the previous night's backup. This restoration of data is an example of which type of security control?

  • Detective

  • Compensating

  • Preventive

  • Corrective

Question 19 of 20

A security team needs to ensure its cloud infrastructure consistently adheres to regulatory standards like PCI-DSS and internal security policies. The team requires a method that provides ongoing visibility into its compliance status. Which of the following is the BEST approach to meet this requirement?

  • Deploying an automated tool that continuously scans configurations and provides real-time compliance alerts.

  • Mandating annual security and compliance training for all cloud engineering and operations staff.

  • Creating a dedicated channel for employees to report potential compliance gaps and suggest policy updates.

  • Scheduling quarterly manual audits of system configurations and access logs to identify non-compliance issues.

Question 20 of 20

Which of these is a primary benefit of implementing automation in secure operations?

  • Standardized risk spread throughout the organization

  • Reduction of complexity

  • Efficiency/time saving

  • Guaranteed cost reduction