00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

An organization relies on specialized industrial control systems to manage its critical operations. Which of the following is the BEST practice to enhance the security of these systems against cyber attacks?

  • Enforce strong password policies for system accounts

  • Conduct regular security awareness training for operators

  • Isolate the industrial control systems on a separate network segment

  • Install antivirus software on control devices

Question 2 of 15

A digital forensics investigator is collecting evidence from a compromised workstation. Which action best maintains the chain of custody?

  • Encrypt the evidence to protect it from unauthorized access.

  • Record the date, time, and individuals who handle the evidence.

  • Analyze the evidence on the original workstation to maintain context.

  • Use write-blocking devices to prevent data alteration.

Question 3 of 15

A system administrator needs to ensure that known security vulnerabilities in their software can be addressed promptly using solutions provided by the vendor. Which consideration is most relevant in this scenario?

  • Patch availability

  • Ease of recovery

  • Compute capacity

  • Resilience

Question 4 of 15

What type of physical security control is primarily utilized for authenticating personnel through the analysis of unique personal attributes before granting access to highly secure areas?

  • Biometric systems

  • Fencing

  • Access Control Vestibule

  • Sensors

Question 5 of 15

A security administrator performs a weekly audit of firewall rules and user permissions on network shares. This proactive, hands-on review process is an example of which category of security control?

  • Managerial control

  • Physical control

  • Operational control

  • Technical control

Question 6 of 15

Under what type of control would you classify antivirus software?

  • Physical

  • Technical

  • Operational

  • Administrative

Question 7 of 15

What is the primary function of ticket creation as part of security operations?

  • To maintain systems and software configurations across the enterprise.

  • To document and track reported security incidents or issues until they are resolved.

  • To manage the delivery of IT services to users within the company.

  • To assess and analyze potential security risks within the organization.

Question 8 of 15

A corporation managing critical infrastructure needs to safeguard its operational technology environment. Among the following choices, which measure would most effectively enhance the defense of their control systems?

  • Implement network segmentation to isolate the control systems from other less secure networks.

  • Disable all unnecessary services and ports on the devices managing the industrial processes.

  • Encrypt all stored data pertaining to operational procedures and configurations.

  • Institute a strict schedule for applying updates to the control system software during operational hours.

Question 9 of 15

Which of the following is the BEST approach to ensure ongoing compliance and security posture of a third-party vendor post-contract signing?

  • Define strict SLAs and consider the vendor monitoring process complete.

  • Rely solely on the vendor-supplied compliance reports.

  • Perform regular independent audits of the vendor's practices.

  • Implement only vendor-supplied security tools for monitoring.

Question 10 of 15

An important component of digital forensics, this must be documented and be accurate to keep any evidence legally admissible and unable to question its integrity.

  • Legal hold

  • Preservation

  • Chain of custody

  • E-discovery

Question 11 of 15

Which of the following security functions is provided by DomainKeys Identified Mail (DKIM)?

  • It encrypts the entire email message during transit to ensure confidentiality.

  • It blocks email from unauthorized IP addresses by checking the envelope sender against an allow list.

  • It verifies that the message body and attachments have not been altered since the sender signed the message.

  • It enforces domain-level policies instructing receivers how to handle failed SPF and DKIM checks.

Question 12 of 15

A security analyst is reviewing the physical security controls for a new data center. To protect the main entrance from vehicle-based threats, the analyst recommends installing bollards. Which type of security control do bollards primarily represent?

  • Corrective

  • Detective

  • Preventive

  • Compensating

Question 13 of 15

Which governance structure in information security is characterized by decision-making authority being concentrated at higher organizational levels rather than distributed among individual departments or teams?

  • Centralized governance structure

  • Matrix governance structure

  • Decentralized governance structure

  • Federated governance structure

Question 14 of 15

An organization needs to ensure that its most critical systems are protected from external network threats and unauthorized access. Which of the following methods provides the MOST secure way to achieve this level of isolation?

  • Install a firewall to filter traffic between these systems and other networks

  • Employ network address translation (NAT) for these devices

  • Use a VLAN to segment these systems from the corporate network

  • Implement an air-gapped network for these systems

Question 15 of 15

During the analysis phase of an incident, an analyst is tasked with determining the scope of a suspected breach on several servers. Which data source will MOST likely provide the comprehensive information required to assess the activities on the affected servers?

  • Vulnerability scans

  • Firewall logs

  • Packet captures

  • Operating system-specific security logs