⚡️ Pass with Confidence Sale - 40% off ALL packages! ⚡️

2 days, 10 hours remaining!
00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

What type of security exercise involves a discussion-based activity where team members analyze and resolve hypothetical scenarios to enhance cybersecurity preparedness?

  • Fire drill

  • Tabletop exercise

  • Simulation

  • Automated report training

Question 2 of 20

A company is finalizing a deal with a security vendor for a range of services that may require occasional adjustments to responsibilities and may involve various projects. To establish the fundamental framework for the relationship, define the overall terms that would generally apply to any subsequent specific projects or Statements of Work, and cover broad aspects such as dispute resolution and data protection, which document should take precedence?

  • Service Level Agreement

  • Business Partners Agreement

  • Acceptable Use Policy

  • Master Service Agreement

Question 3 of 20

An organization needs to ensure the integrity and authenticity of its software by proving the software has not been tampered with after release. Which type of certificate should be used to sign the software digitally before distribution?

  • Root certificate

  • Email certificate

  • Self-Signed certificate

  • Code Signing certificate

Question 4 of 20

Considering your current network security setup only provides notifications when potential security breaches occur, which enhancement would allow the system to not just detect but also proactively counteract malicious traffic?

  • Implement a system with automatic threat mitigation capabilities

  • Bolster the organization's data loss prevention (DLP) strategies

  • Enhance the cryptographic assurance using public key infrastructure (PKI)

  • Incorporate additional security information and event management (SIEM) features

Question 5 of 20

An organization wants to gather intelligence on attack techniques by implementing a system that mimics vulnerable services and records interactions with potential intruders. Which of the following would BEST achieve this goal?

  • Intrusion detection system

  • Vulnerability scanner

  • Honeypot

  • Firewall configured with logging

Question 6 of 20

A network operations team applied an emergency configuration update to several core routers during production hours, causing an unexpected outage. Management later discovered that the change was neither logged in the ticketing system nor reviewed by the appropriate stakeholders.

Which governance procedure, if properly followed, would most likely have prevented this outage?

  • Change Management

  • Acceptable Use Policy

  • Incident Response

  • Business Continuity Planning

Question 7 of 20

During an incident response exercise, a security analyst needs to follow a set of predetermined, task-level instructions for handling a specific type of malware outbreak. The instructions detail the exact steps for detection, containment, and eradication. What is this type of document called?

  • Risk Analysis Documentation

  • Change Management Policy

  • Information Security Policy

  • Playbook

Question 8 of 20

A security administrator is implementing an encryption system that uses two distinct, but related keys. One key is used for encrypting data, and the other is used for decrypting it. What type of cryptography is being implemented?

  • Hashing

  • Asymmetric key cryptography

  • Block cipher

  • Symmetric key cryptography

Question 9 of 20

A security analyst reviewing logs notices that four user accounts were locked out within a five-minute window. Which of the following BEST explains why the analyst should investigate further before declaring a security incident?

  • Account lockouts can occur for benign reasons-for example, users repeatedly mistyping passwords-so additional evidence is required to confirm malicious activity.

  • Lockout policies are enforced solely on domain controllers, making every lockout an indicator of privileged-account compromise.

  • Modern operating systems no longer lock accounts unless a brute-force attack is detected by the kernel, so a lockout always signals an attack.

  • Account lockouts only happen after a successful logon, so any lockout automatically proves that credentials were stolen.

Question 10 of 20

Which of the following options is a vendor-neutral standard for message logging?

  • SIEM

  • Event manager

  • SNMP

  • syslog

Question 11 of 20

What is the primary purpose of performing a packet capture in the context of network security?

  • To provide network users with a secure method of file transfer

  • To increase the bandwidth and performance of the network

  • To collect and analyze network traffic for security monitoring and investigative purposes

  • To restrict access to network resources based on IP addresses

Question 12 of 20

An organization's Intrusion Detection System (IDS) recently flagged numerous failed login attempts on a server from a single IP address within a short period. What type of activity is MOST likely being detected?

  • Distributed Denial of Service (DDoS) attack

  • Brute force attack

  • Port scanning

  • Phishing attempt

Question 13 of 20

Which international framework should a multinational corporation adopt to ensure compliance with global data protection and privacy standards?

  • General Data Protection Regulation

  • United Nations Convention on Contracts for the International Sale of Goods

  • Shipping Port Security Act

  • Federal Information Security Management Act

Question 14 of 20

What is 'blocked content' often an indicator of in the context of cybersecurity?

  • Network congestion due to large volumes of legitimate traffic

  • Successful exfiltration of sensitive information from a network

  • The process of encrypting data to prevent unauthorized access

  • Attempts to access or distribute restricted or malicious data

Question 15 of 20

Which approach aligns with the security principle that dictates user permissions should be limited to the bare minimum necessary to accomplish their work tasks?

  • Granting full rights to all users to avoid performance bottlenecks

  • Assigning permissions based strictly on job requirements

  • Providing users with read-write access to all network devices

  • Applying time-of-day restrictions to user logins

Question 16 of 20

A security analyst is discussing cybersecurity with a family member who mentions a recent incident. The family member received an unsolicited phone call from someone claiming to be a support technician from a major software vendor. The caller convinced the family member that their computer was infected with a virus and guided them to install a "removal tool", which was actually malware. Which of the following social engineering attacks BEST describes this incident?

  • Watering hole

  • Tailgating

  • Spear phishing

  • Vishing

Question 17 of 20

Which of the following best describes the concept of availability in the context of high availability systems?

  • The ability of a system to quickly restore operations and functionality following an outage

  • A security measure that involves ensuring a computer or network is physically isolated from other networks

  • The capability of a system to facilitate the immediate processing of data inputs and outputs

  • The assurance that systems and services are reliable and can operate without excessive downtime

Question 18 of 20

Which of the following is an example of a factor that would be categorized under 'something you are' when implementing multifactor authentication?

  • Smart card in possession of the user

  • Retinal scan

  • Password known only to the user

  • Digital certificate installed on a smartphone

Question 19 of 20

After a recent data breach where an adversary successfully exfiltrated sensitive data, the incident response team has completed the containment and eradication stages. Which action would BEST equip the team to perform root cause analysis and determine the original vulnerability exploited?

  • Conducting a thorough analysis of security logs for signs of initial compromise

  • Running a comprehensive vulnerability scan on all networked systems

  • Initiating a campaign to re-educate all users about phishing and social engineering

  • Scheduling a complete review of all organizational security policies and procedures

Question 20 of 20

A company needs its critical applications to remain operational with minimal downtime, even in the event of hardware failures. Which strategy is most appropriate to meet this requirement?

  • Deploying encryption to secure data at rest

  • Implementing a server cluster with load balancing

  • Scheduling regular system updates during low usage periods

  • Using a single powerful server with redundant components