00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

A corporation is evaluating the possible financial impact of an internal network compromise. With the internal network assets valued at $2 million, which of the following best illustrates the 'Exposure Factor' for this risk assessment?

  • The $2 million total value of the network assets that are at risk.

  • The likelihood, expressed as a percentage, that the network assets will be compromised each year.

  • The annual amount required to insure the $2 million worth of network assets against compromise.

  • The estimated percentage of the $2 million that would be lost if the network is compromised.

Question 2 of 15

An organization wants to detect unauthorized attempts to access their sensitive data. They decide to embed uniquely crafted bait elements within their data repositories that will trigger alerts when interacted with. Which of the following deception technologies would BEST achieve this objective?

  • Using honeytokens

  • Setting up a honeynet

  • Implementing honeyfiles

  • Deploying a honeypot

Question 3 of 15

An organization has recently implemented a monitoring system that flags unusual behavior on its network and alerts the security team for potential security breaches. This system was established after a recent incident where unauthorized access went undetected for an extended period. Based on this scenario, what type of control has the organization most likely implemented?

  • Detective Control

  • Corrective Control

  • Preventive Control

  • Compensating Control

Question 4 of 15

A financial services company based in the United States is preparing to launch a new platform for customers in the European Union and several countries in South America. The CISO has tasked the security team with reviewing all relevant data transfer and privacy laws, such as the GDPR. Which type of external governance consideration is being addressed?

  • National

  • Local/Regional

  • Global

  • Industry-specific

Question 5 of 15

When evaluating security architecture for an enterprise's network infrastructure, what is the primary reason for ensuring patch availability for all software components?

  • To increase the system's processing speed

  • To enhance the graphical user interface

  • To ensure compatibility with legacy systems

  • To fix security vulnerabilities and bugs

Question 6 of 15

The security team at a large corporation is inundated with alerts from their Security Information and Event Management system, with a substantial number being false positives. What is the most effective approach to reduce the number of false positive alerts without significantly compromising the ability to detect actual threats?

  • Turn off alerts for events considered low risk to reduce the number of incoming notifications.

  • Raise the alert threshold so only the highest severity incidents are reported.

  • Disable alerts that are commonly producing false positives.

  • Refine correlation rules to enforce more specific conditions for triggering alerts.

Question 7 of 15

A company's primary data center is located in a region prone to earthquakes. A security administrator is tasked with implementing a backup strategy to ensure data can be recovered even if the data center is completely destroyed. Which of the following backup strategies would be the MOST effective in mitigating this specific risk?

  • Back up data to tapes and store them in a fireproof safe located in the same building.

  • Implement RAID-6 arrays for all critical servers onsite.

  • Store encrypted backups at a geographically separate, offsite location.

  • Create daily snapshots stored on a separate storage area network (SAN) within the same data center.

Question 8 of 15

A security analyst is reviewing data handling policies for their organization. They need to ensure that data stored on hard drives, SSDs, and backup tapes is properly encrypted. Which of the following data states correctly describes this type of data?

  • Data at rest

  • Data in process

  • Data in use

  • Data in transit

Question 9 of 15

Which state describes information that is being processed by an application?

  • Data at rest

  • Encrypted data

  • Data in use

  • Data in transit

Question 10 of 15

Which of the following BEST illustrates the purpose of performing regular self-assessments of security governance within an organization?

  • To measure and analyze the effectiveness and compliance of the security governance against internal standards and regulatory requirements.

  • To reactively provide details to stakeholders following a security breach or incident.

  • To ensure that all new technological implementations are secure before they go live into the production environment.

  • To assess individual employee compliance with security training requirements on an annual basis.

Question 11 of 15

Which type of threat actor is MOST likely to engage in activities aiming to obtain sensitive information from an organization to demand payment in return for not releasing the information?

  • Hacktivist

  • Nation-state

  • Unskilled attacker

  • Organized crime

Question 12 of 15

Which of the following best describes the role of automation in security program management?

  • Employing artificial intelligence to simulate human thinking in the analysis of security threats

  • Manipulating human interactions to gain unauthorized access to confidential information

  • Using technology to perform repetitive and consistent tasks to increase efficiency and reduce human error

  • Defining protocols for encrypting data across various applications and systems

Question 13 of 15

An organization needs to ensure the integrity and authenticity of its software by proving the software has not been tampered with after release. Which type of certificate should be used to sign the software digitally before distribution?

  • Code Signing certificate

  • Root certificate

  • Self-Signed certificate

  • Email certificate

Question 14 of 15

A company is looking to protect its customers' credit card information within its database while still using the data for transactional processes. Which method ensures the original data cannot be derived from the information stored in the database without access to a separate mapping system?

  • Tokenization

  • One-way Hashing

  • Format-Preserving Encryption

  • Data Masking with Fixed Mask Characters

Question 15 of 15

Which component is built into a computing device to provide secure generation, storage, and use of cryptographic keys?

  • Hardware Security Module

  • Secure Boot

  • Biometric Sensor

  • Trusted Platform Module