00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

CompTIA Security+ SY0-701 (V7) Logo
  • Free CompTIA Security+ SY0-701 (V7) Practice Test

  • 20 Questions
  • Unlimited
  • General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

A company has observed that employees are frequently accessing social media sites during work hours, leading to decreased productivity. The IT department decides to update the company's guidelines to address this issue. Which element of the security governance framework should they revise to regulate acceptable internet usage by employees?

  • Information Security Policy

  • Acceptable Use Policy (AUP)

  • Access Control Standards

  • Incident Response Procedures

Question 2 of 20

During a routine assessment, a security analyst is tasked with using OSINT to identify potential vulnerabilities that could affect their organization’s network infrastructure. Which of the following methods would BEST support this activity?

  • Reviewing the organization’s website source code on the production server for misconfigurations

  • Analyzing social media profiles of the organization’s IT staff for potential leads on system flaws

  • Attending industry conferences to gather insights on common network infrastructure issues

  • Using search engines to discover discussions and reports on new vulnerabilities affecting similar network infrastructure

Question 3 of 20

A financial services company is updating its disaster recovery plan. A primary goal is to ensure that its core transaction processing system can be fully operational within 15 minutes of any unexpected shutdown. Which high availability consideration does this goal most directly address?

  • Ease of recovery

  • Cost

  • Resilience

  • Scalability

Question 4 of 20

An organization utilizes virtualization to run multiple Virtual Machines on a single physical server for different departments. Recently, it was discovered that confidential data from one Virtual Machine was accessible to users on another Virtual Machine due to inadequate resource sanitization. Which of the following mitigates this virtualization vulnerability?

  • Disable hyper-threading on physical CPUs to prevent side-channel attacks

  • Sanitize resources when deallocating virtual machines

  • Install antivirus software on the host to detect malware within virtual machines

  • Isolate virtual machines in separate VLANs to prevent network sniffing

Question 5 of 20

Your organization wants to shorten the time it takes to discover and fix security weaknesses across hundreds of servers while ensuring every system is treated the same way. According to vulnerability-management best practices, what is the primary benefit of introducing automated workflows into this process?

  • To eliminate the necessity of establishing secure baselines for systems.

  • To ensure manual processes remain the primary method for vulnerability detection.

  • To increase efficiency and consistency in vulnerability detection and response.

  • To completely eliminate user error in vulnerability management.

Question 6 of 20

Which of the following BEST describes how an organization should manage security risk associated with a third-party vendor after the contract has been signed?

  • Rely solely on service-level agreements and accept residual risk without further monitoring.

  • Delegate all risk monitoring to the vendor's internal audit function and review their reports annually without independent verification.

  • Perform the due-diligence review only at onboarding; reassess the vendor again only if a security incident occurs.

  • Conduct an initial due-diligence review, then implement ongoing monitoring and periodic reassessments throughout the relationship.

Question 7 of 20

A pharmaceutical company stores its proprietary drug formulas, which are considered trade secrets, on an internal file server. A security analyst is tasked with protecting this sensitive data from disclosure, even if an attacker or an unauthorized employee gains access to the server itself. Which of the following controls would be the MOST effective at achieving this specific goal?

  • Implementing strict access control lists (ACLs) on the file share

  • Encrypting the files containing the formulas

  • Placing the server in a locked data center with biometric access

  • Isolating the server on its own network segment

Question 8 of 20

A company's IT department recently received complaints from several employees that they have been contacted by 'tech support' via phone call, requesting their login credentials to resolve a supposed network issue. Which of the following best describes this type of security threat?

  • Pretexting

  • Email phishing

  • Vishing

  • Smishing

Question 9 of 20

Your company is in the process of selecting a cloud service provider to host critical infrastructure. Your management team wants to ensure thorough evaluation of potential vendors to avoid legal, compliance, and operational risks. Which of the following actions exemplifies proper due diligence in this scenario?

  • Select a vendor based on the recommendation of an acquaintance at a partnering organization.

  • Review third-party audit reports of the vendors.

  • Agree on the pricing and service level agreements.

  • Review the company's own internal information security policies.

Question 10 of 20

Which of the following is a primary security benefit of implementing network segmentation in an enterprise environment?

  • It enables unrestricted connectivity between all network zones to simplify management.

  • It eliminates the need for perimeter and internal firewalls.

  • It isolates sensitive systems and restricts lateral movement, thereby reducing the attack surface.

  • It guarantees redundant power supplies and cooling for critical servers.

Question 11 of 20

Government entities commonly establish regulations and minimum security requirements, but private corporations are ultimately responsible for drafting the detailed security policies and selecting the specific technical and administrative controls necessary to comply with those regulations.

  • True

  • False

Question 12 of 20

A web hosting company is expanding its services to support high-traffic websites. The company needs to ensure that the resources are evenly distributed across servers to manage dynamic loads effectively. Which solution should the company primarily consider implementing to address this requirement?

  • Adopt a serverless computing model to eliminate the need to manage server resources entirely.

  • Implement a load balancer to manage the distribution of the network traffic across the servers.

  • Set up a server cluster that treats multiple servers as a single system for failover redundancy.

  • Utilize containerization to encapsulate the web applications on a single server.

Question 13 of 20

A large financial institution is preparing to revise its security protocols to enhance the protection of client data. The institution has multiple international offices and must comply with various regional encryption standards. Which of the following should be the primary consideration when updating the company-wide encryption standard?

  • Develop a new encryption standard internally that is different from all regional standards but meets the minimum required security level.

  • Follow only the regional encryption standards of the country where the financial institution's headquarters is located.

  • Adopt the strictest regional encryption standard as the company-wide standard to ensure compliance across all locations.

  • Implement the least strict regional encryption standard to minimize complications in international operations.

Question 14 of 20

A financial institution wants to ensure their online banking services remain accessible to customers even if a cyberattack disrupts their main operational site. Which strategy should they implement to maintain service availability under such circumstances?

  • Deploy an IDS to monitor and detect malicious network activity.

  • Perform weekly backups of critical data to secure storage.

  • Enforce strict firewall policies to prevent unauthorized access.

  • Establish a geographically separated hot site for operational continuity.

Question 15 of 20

Which of the following best describes how often an organization should review its information security policies to ensure they remain effective over time?

  • On an ad hoc basis, but only after a security incident highlights a gap.

  • At least periodically (for example, annually) and whenever significant changes in risks, technology, or business processes occur.

  • Only once, when the policy is first published, because future changes are unlikely.

  • Only after a merger or acquisition that changes the corporate structure.

Question 16 of 20

A multinational company has recently launched a cloud service platform and is considering introducing a bug bounty program to enhance its security measures. What is the most important reason for the company to integrate a bug bounty program into its vulnerability management process?

  • To ensure the company's compliance with international cybersecurity regulations and standards.

  • To focus specifically on mitigating zero-day exploits by having them reported through the program.

  • To promote the company's dedication to transparency and foster trust among its user base.

  • To uncover otherwise undetected vulnerabilities by leveraging the collective efforts of the global security research community.

Question 17 of 20

What process involves the collection of log data from various systems and services to centralize analysis and review?

  • Log aggregation

  • Scanning

  • Reporting

  • Alerting

Question 18 of 20

A software development team has decided to rearchitect its customer-facing web application to improve scalability and security. They plan to break the application into a set of small, independently deployable services, with each service focused on a single business capability and communicating through lightweight REST APIs. Which architecture model are they adopting?

  • Microservices

  • Service-Oriented Architecture (SOA)

  • Monolithic Architecture

  • Function as a Service (FaaS)

Question 19 of 20

Your employer is planning to place wireless devices at the entrance of their retail locations. The devices will use WiFi to connect to the store's wireless network and use beams of light to detect when someone enters through the entrance. Other than WiFi, what type of wireless communication is being used?

  • Infrared

  • NFC

  • Bluetooth

  • 802.11

Question 20 of 20

In the context of risk management strategies, what does it mean to 'Avoid' a risk?

  • Accepting the risk and taking no further action

  • Reducing the impact of the risk should it occur

  • Eliminating the risk by not engaging in activities that lead to it

  • Transferring the responsibility of the risk to another party