00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

A company has recently deployed a new IoT device in their network. During the security assessment, it was found that the device is still using default credentials. Which of the following actions is the BEST immediate step to mitigate the potential exploitation of this device?

  • Conduct a thorough vulnerability scan of the device to find potential weaknesses.

  • Disable remote management features on the IoT device to limit network-based attacks.

  • Change the default username and password to a complex, unique credential set.

  • Update the IoT device firmware to the latest version available from the manufacturer.

Question 2 of 20

A security administrator is tasked with ensuring the organization's security policies and procedures remain effective. Which of the following represents the BEST approach for reviewing these documents?

  • Only when a major security incident or data breach occurs

  • On a periodic schedule and in response to significant organizational or environmental changes

  • Whenever a new technology system is introduced into the environment

  • At the beginning of each fiscal year when new budgets are allocated

Question 3 of 20

Which of the following best represents the role of endpoint protection software as a system hardening technique in an organization's cybersecurity strategy?

  • To backup data periodically and ensure disaster recovery for individual endpoint devices

  • To manage user permissions and access control lists across the network

  • To provide comprehensive security measures, such as antivirus and personal firewall capabilities, to individual devices within a network

  • To optimize the performance and speed of endpoint devices for better user experience

Question 4 of 20

When implementing password protection measures, which of the following best describes a salt in cryptographic terms?

  • An encryption method that dynamically changes the secret key based on a predefined algorithm

  • A verification process to confirm that a digital message or document is intact and unaltered

  • The act of repeatedly hashing a password multiple times to extend the amount of time required to hash passwords

  • A random value added to each password prior to hashing to ensure that the resulting hash will be unique

Question 5 of 20

What type of security threat occurs when an attacker manipulates file-referencing variables with sequences like ../ to access files and commands located outside the web server's intended root folder?

  • Cross-site scripting

  • Buffer overflow

  • Directory traversal

  • SQL injection

Question 6 of 20

A security analyst is reviewing the organization's incident reports and notices an incident where attackers sent deceptive messages to employees' mobile phones with the intent to trick them into sharing sensitive information. What type of attack does this scenario describe?

  • SMS phishing

  • Direct Malware Injection

  • Exploit Kits via MMS

  • Spyware Installation

Question 7 of 20

An organization is reviewing its security policies to better protect against unauthorized access to employee accounts. Which of the following would be the BEST mitigation strategy to prevent a brute force attack on user passwords?

  • Monitoring for unauthorized access attempts on user accounts

  • Disabling unused accounts

  • Implementing strong password policies that require complex passwords

  • Enabling account lockouts after a specified number of failed login attempts

Question 8 of 20

Which containment technique would be the best response when a system is believed to be infected with malware?

  • Determine the attack vector and disable it

  • Immediately segment the network into the smallest possible groups

  • Propagation

  • Isolate the affected systems

Question 9 of 20

An analyst is reviewing application logs to identify unauthorized access to confidential files. Which of the following BEST indicates an incident that requires immediate investigation?

  • Frequent connection errors to the database server from an application's service account.

  • A single failed login attempt from a known user's IP address.

  • Repeated application time-outs during peak business hours.

  • Multiple failed login attempts followed by a successful login in a short time frame.

Question 10 of 20

What term best describes an attribute of a security architecture focused on continuing service delivery in the event of component failures or other issues?

  • Scalability

  • Resilience

  • Responsiveness

  • Maintainability

Question 11 of 20

During routine maintenance, a technician finds a wireless router connected to the corporate network that was not installed by the IT department. An investigation reveals that an employee installed the router for personal convenience to use a laptop wirelessly. What type of threat actor does this scenario represent?

  • Unskilled attacker

  • Shadow IT

  • Insider threat

  • Organized crime

Question 12 of 20

A system administrator has been tasked with securing data at rest for a company's document storage server, ensuring maximum confidentiality. Which of the following solutions would be the MOST appropriate to accomplish this task?

  • Encrypt each document individually with a unique key.

  • Ensure Secure Socket Layer (SSL)/Transport Layer Security (TLS) is enabled on the server.

  • Implement full disk encryption on the document storage server drive.

  • Utilize a VPN with robust encryption for accessing documents remotely.

Question 13 of 20

A network technician is performing the initial setup of a new wireless router. Which of the following is the most important first step the technician should take to secure the device?

  • Implementing port forwarding

  • Disabling unused ports

  • Updating the firmware to the latest beta release

  • Changing the default credentials

Question 14 of 20

An organization wants to gather intelligence on attack techniques by implementing a system that mimics vulnerable services and records interactions with potential intruders. Which of the following would BEST achieve this goal?

  • Honeypot

  • Firewall configured with logging

  • Vulnerability scanner

  • Intrusion detection system

Question 15 of 20

An attacker has setup a fraudulent wireless access point on a company’s network that mimics one of the network’s legitimate access points. Through this fraudulent access point the attacker can gain access to the sensitive information transmitted by those who unwittingly connect to it. This fraudulent access point is known as what?

  • Disassociation

  • Evil twin

  • Rouge access point

  • Jamming

Question 16 of 20

A company needs to systematically manage updates and modifications to its IT systems to prevent unintended consequences during regular operations. Which operational control MOST effectively addresses this need?

  • Change management

  • Security awareness training

  • Encryption protocols

  • Intrusion detection

Question 17 of 20

Which power solution would be the BEST option for a business to maintain data center operations during a short-term power outage and to facilitate graceful shutdown of servers if the outage persists?

  • Multiple power circuits designed to take over if one fails

  • A device that generates power after a startup delay and supports long-term outages

  • A device providing backup power and power conditioning, capable of initiating a controlled shutdown

  • A device that guards against electrical power surges and spikes only

Question 18 of 20

An employee in your organization received a call from an individual claiming to be from the IT department. The caller stated they were conducting routine security checks and needed the employee's username and password to ensure his account is secure. The caller is exceptionally polite and knowledgeable about company protocols. Which type of social engineering attack is MOST likely occurring?

  • Pretexting

  • Baiting

  • Phishing

  • Quid pro quo

Question 19 of 20

During an internal audit, it was discovered that an organization lacked a formal process for employees to report security vulnerabilities. To rectify this, the auditor recommended the creation of a new document. Which document should specifically outline the procedures for reporting security weaknesses?

  • Business Continuity Policy

  • Incident Response Policy

  • Disaster Recovery Policy

  • Change Management Policy

Question 20 of 20

A company's workforce is highly mobile with employees frequently travelling and working from remote locations. The IT security department needs to ensure that the devices used by this mobile workforce are consistently assessed for vulnerabilities. Which strategy would be most effective for maintaining the security posture of these devices when they are not connected to the company’s network?

  • Schedule scans using an agentless vulnerability scanning solution when devices are known to be connected to the company's VPN.

  • Only allow devices to connect to the network through wired connections within the company's premises to ensure constant vulnerability assessments.

  • Deploy a client-based vulnerability scanning solution with agents installed on each device.

  • Setup a vulnerability scanning service which all devices must connect to monthly.