00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

A healthcare company relies on a virtualized server environment to store sensitive patient records. The IT security specialist is implementing a backup strategy that allows for quick restoration of data with minimal data loss in case of a server crash. Which of the following would be MOST effective for this purpose?

  • Setting up differential backups every 48 hours

  • Performing a full backup of the servers on a weekly basis

  • Configuring incremental backups to be taken daily

  • Using scheduled snapshots of the virtual machines

Question 2 of 15

A healthcare software provider is designing a new patient management system. To ensure an integrated approach to security, which method should be applied to the project from the beginning?

  • Reviewing and updating agreements with third-party service providers to improve security incident response times

  • Restricting access to the development environments by implementing role-based access control

  • Encrypting the database to protect patient records without integrating additional security measures throughout the development process

  • Introducing security controls during the requirements phase, enforcing coding standards throughout the development process, and performing security testing before the system's release

Question 3 of 15

What is the primary role of a generator within the security architecture of a data center?

  • To regulate the distribution of power to different circuits

  • To cool down the server racks and prevent overheating

  • To serve as a primary power source during peak operation times

  • To provide backup power in the event of a main power supply failure

Question 4 of 15

After a security breach has been contained, an organization must eradicate the threat to prevent further damage. Which of the following actions is the MOST effective way to ensure a sophisticated rootkit is completely removed from a critical server?

  • Powering off the server until a suitable removal method is determined.

  • Patching the server with the latest security updates.

  • Booting to a known clean recovery environment to conduct rootkit removal.

  • Updating antivirus signatures and rerunning a full scan.

Question 5 of 15

Which solution aggregates logs and other security data from various hardware and software systems in an organization to assist in identifying and managing potential security incidents?

  • Network Management with Simple Network Management Protocol traps

  • Data Loss Prevention system

  • Security Information and Event Management system

  • Intrusion Detection System

Question 6 of 15

Administrators at a financial institution have noticed that its transaction processing application terminates unexpectedly whenever excessively long strings of characters are entered into the input fields. Which vulnerability might be the most likely cause of this application behavior?

  • SQL Injection

  • Cross-Site Scripting (XSS)

  • Directory Traversal

  • Buffer Overflow

Question 7 of 15

Which of the following practices most clearly violates the principle of least privilege on user workstations in an enterprise environment?

  • Granting standard employees local administrator rights on their workstations

  • Restricting database administrators to only the tables they maintain

  • Assigning read-only permissions to employees who only need to view quarterly reports

  • Providing a time-limited privileged account to a support technician during system maintenance and removing it afterward

Question 8 of 15

A multinational company with offices in multiple countries is implementing a new security policy. Which of the following is the BEST course of action to ensure the policy complies with all applicable local and regional regulations?

  • Have local employees provide input on what they believe are the main legal requirements for their respective regions.

  • Consult with legal experts specializing in cybersecurity and privacy laws for each country where the offices are located.

  • Implement the strictest regional security practices found among the company's offices to ensure maximum protection.

  • Align the security policy with internationally recognized standards to cover all regional variations.

Question 9 of 15

A security administrator is responsible for maintaining the integrity of software deployed in the company's server environment. They need to detect any unauthorized software modifications and ensure that only approved packages are running on the systems. Which solution should the administrator implement to meet these requirements?

  • Implementing a file integrity monitoring solution that automatically checks for changes to software packages

  • Maintaining a configuration management database that records installed software versions

  • Configuring systems to receive automatic software updates

  • Performing regular antivirus scanning on all servers

Question 10 of 15

ABC Tech Corporation is considering outsourcing their customer support services to XYZ Support Inc. As part of the vetting process, which of the following is the most appropriate action to ensure due diligence and care is exercised in selecting a third-party vendor?

  • Delegate the decision to an intern, assuming that third-party vendors have similar capabilities

  • Choose XYZ Support Inc. because they offered the lowest bid, thereby saving on costs

  • Conduct an in-depth background check on XYZ Support Inc., which includes financial, reputational, and performance aspects

  • Review the marketing materials of XYZ Support Inc. for their success stories and client testimonials

Question 11 of 15

An organization is designing a high-availability web application that must handle fluctuating workloads and ensure minimal downtime during peak usage. Which of the following strategies BEST addresses the compute considerations for achieving high availability in this scenario?

  • Utilizing real-time data replication to a standby server

  • Deploying redundant power supplies for each server

  • Implementing load balancing to distribute traffic across multiple servers

  • Scheduling regular maintenance during off-peak hours

Question 12 of 15

Organizations sometimes engage an independent third-party to perform a security audit. Aside from satisfying governmental regulatory mandates, which of the following is a primary business reason for commissioning such an audit?

  • To assure customers and partners that the organization's security controls follow industry best practices and to build trust.

  • To remove the need for any internal security assessment activities in the future.

  • To avoid having to meet security clauses written into existing service-level agreements.

  • To hide known security weaknesses from prospective investors during due diligence.

Question 13 of 15

An employee receives a phone call from an individual claiming to be a member of the IT department's security audit team. The caller explains that due to a recent security incident, they are verifying all user credentials. The caller uses a professional tone, refers to a non-existent ticket number, and asks the employee to provide their username and password for verification. Which social engineering technique does this scenario BEST describe?

  • Smishing

  • Pretexting

  • Phishing

  • Watering hole

Question 14 of 15

You work for a large national realty company in the networking department. Recently your department received a help desk call from a smaller satellite office stating their WiFi is no longer working. The trouble ticket was escalated to you because company policy does not allow wireless networks. After further investigation you learn that an employee in the office setup a simple wireless router themselves. Which option best defines this situation?

  • Unauthorized twin

  • Disassociation

  • Rogue AP

  • Evil twin

Question 15 of 15

Which type of security control is primarily used to identify unauthorized access or activities on a network?

  • Backup Systems

  • Security Policies

  • Intrusion Detection System (IDS)

  • Firewalls