00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

Your employer allows BYOD because the company's software landscape is entirely based on SaaS applications on the internet. Recently, an employee's various accounts were accessed by a hacker. The user tells you they had different passwords for all of the applications. No one else has reported similar issues. After helping the user conduct a malware scan on their personal device, you find that they have malware that records input given to the PC by the user. What option best describes the type of malware found?

  • Keylogger

  • Virus

  • RAT

  • Worm

Question 2 of 15

What is the primary purpose of performing a packet capture in the context of network security?

  • To restrict access to network resources based on IP addresses

  • To provide network users with a secure method of file transfer

  • To collect and analyze network traffic for security monitoring and investigative purposes

  • To increase the bandwidth and performance of the network

Question 3 of 15

A security administrator is in the process of defining the initial set of security configurations that will be applied to all new devices in the company. Which of the following is the BEST method to achieve this objective?

  • Applying a standardized security configuration guide to the devices.

  • Enforcing full-disk encryption on all new devices.

  • Setting up a proper disposal and decommissioning process for devices.

  • Regularly patching the devices as part of routine maintenance.

Question 4 of 15

Which of the following BEST represents the concept of likelihood when performing a risk assessment?

  • Determining the potential impact on the company's reputation if a security incident were to occur.

  • Calculating the monetary loss that could occur if a threat exploits a vulnerability.

  • Assessing the cost and benefits of implementing additional security controls to address vulnerabilities.

  • Evaluating the probability that a vulnerability will be exploited by a threat within a given time frame.

Question 5 of 15

A financial services company notices that their online banking platform becomes unresponsive during certain peak hours despite having no unusual activity from legitimate users. The IT team suspects a network-based attack designed to overwhelm their servers. Which type of attack are they most likely experiencing?

  • DDoS

  • Credential Replay

  • DNS Spoofing

  • Wireless Eavesdropping

Question 6 of 15

An organization's staff is distributed across varying locations, each with varying levels of network security. To strengthen their security posture for collaborative efforts, which measure would be most effective in ensuring authorized access to shared company resources?

  • Enforce a policy requiring users to change their passwords monthly.

  • Limit the connection times to shared resources to specific hours of the working day.

  • Implement multi-factor authentication for all users when accessing shared company resources.

  • Mandate email encryption for all internal and external communication.

Question 7 of 15

A network scan of a public-facing server reveals that several ports are open. A system administrator confirms that one of these ports is not required for any of the server's intended applications or services. What is the primary security risk associated with this unnecessary open port?

  • It prevents legitimate users from accessing the server's intended services.

  • It increases the attack surface, providing an additional entry point for potential exploits or unauthorized access attempts.

  • It consumes a significant amount of CPU and memory resources, degrading server performance.

  • It will cause immediate data exfiltration from the server's primary application.

Question 8 of 15

Which of the following practices most clearly violates the principle of least privilege on user workstations in an enterprise environment?

  • Granting standard employees local administrator rights on their workstations

  • Assigning read-only permissions to employees who only need to view quarterly reports

  • Restricting database administrators to only the tables they maintain

  • Providing a time-limited privileged account to a support technician during system maintenance and removing it afterward

Question 9 of 15

What type of risk assessment is conducted as needed, often in response to specific events or changes in the environment?

  • Recurring

  • Qualitative

  • Continuous

  • Ad Hoc

Question 10 of 15

A lazy programmer at a startup was recently fired for sleeping at their cubicle. Angry about being fired and wanting revenge, the programmer accessed the admin panel of the startup's website using a method they had previously programmed into the application before being dismissed. With access to the admin panel, the former employee was able to delete user accounts from the database, causing significant issues for the company. Which of the following options best describes the methodology of the attack?

  • Ransomware

  • Backdoor

  • Rootkit

  • SQL injection

Question 11 of 15

An IT administrator has noted several workstations in the company are exhibiting similar unsettling behaviors including unexpected slowdowns, random printing of documents, and system restarts occurring without user initiation. These anomalies are observed concurrently in various unrelated business units. What should the IT administrator suspect as the MOST plausible cause for these widespread and consistent issues?

  • The workstations are likely infected with a virus.

  • The systems are experiencing widespread hardware failure.

  • There is a script kiddie exploiting network vulnerabilities.

  • There is a misconfiguration of system settings across the network.

Question 12 of 15

What describes a model where data processing and decision-making are performed at various distributed network points rather than at a single central location?

  • Decentralized architecture

  • Hybrid architecture

  • Centralized architecture

Question 13 of 15

When implementing password protection measures, which of the following best describes a salt in cryptographic terms?

  • A random value added to each password prior to hashing to ensure that the resulting hash will be unique

  • The act of repeatedly hashing a password multiple times to extend the amount of time required to hash passwords

  • An encryption method that dynamically changes the secret key based on a predefined algorithm

  • A verification process to confirm that a digital message or document is intact and unaltered

Question 14 of 15

When a company needs to guard its intellectual property during transmission over a public network, which method should be employed to best secure the data, assure its integrity, and authenticate the communicators?

  • Enforcing the use of encrypted email services for sharing any sensitive documents

  • Digitally signing all documents before sharing via the company's standard email service

  • Utilizing an encrypted file transfer service for all outbound company communications

  • Employing an encrypted tunneling protocol for securing all company data transmissions

Question 15 of 15

Which firewall would you recommend if the organization is looking for a firewall with the added functionality of an IPS?

  • Layer 4

  • Layer 7

  • WAF

  • NGFW