00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

Considering your current network security setup only provides notifications when potential security breaches occur, which enhancement would allow the system to not just detect but also proactively counteract malicious traffic?

  • Enhance the cryptographic assurance using public key infrastructure (PKI)

  • Incorporate additional security information and event management (SIEM) features

  • Implement a system with automatic threat mitigation capabilities

  • Bolster the organization's data loss prevention (DLP) strategies

Question 2 of 15

An IT security manager wants to ensure that users can employ complex and unique passwords for each of their accounts without the need to remember each one individually. Which of the following solutions would best meet this requirement?

  • Enforcing strict password complexity and expiration policies

  • Implementing biometric authentication methods

  • Implementing a password manager application

  • Deploying single sign-on authentication for all services

Question 3 of 15

What term is used to describe a component within a system that, if it were to fail, would cause the entire system to cease functioning?

  • Documentation

  • Scalability

  • Limiting factor

  • Single point of failure

Question 4 of 15

Which component is essential for defining and enforcing granular access controls in a Zero Trust network?

  • Device compliance and health check

  • Annual security awareness training

  • Standard static firewall rules

  • Adaptive identity and policy-driven access control

Question 5 of 15

A system administrator has been tasked with securing data at rest for a company's document storage server, ensuring maximum confidentiality. Which of the following solutions would be the MOST appropriate to accomplish this task?

  • Ensure Secure Socket Layer (SSL)/Transport Layer Security (TLS) is enabled on the server.

  • Utilize a VPN with robust encryption for accessing documents remotely.

  • Encrypt each document individually with a unique key.

  • Implement full disk encryption on the document storage server drive.

Question 6 of 15

Which tool should an organization implement to enhance its capability to analyze and respond to security incidents across its IT infrastructure in a timely manner?

  • Establish a comprehensive strategy for secure handling and transfer of sensitive information

  • Install additional firewall rules for improved network perimeter defense

  • Implement a system that collates and analyzes security alerts and automates response actions

  • Deploy enhanced endpoint protection on all company devices

Question 7 of 15

What is 'blocked content' often an indicator of in the context of cybersecurity?

  • Network congestion due to large volumes of legitimate traffic

  • The process of encrypting data to prevent unauthorized access

  • Successful exfiltration of sensitive information from a network

  • Attempts to access or distribute restricted or malicious data

Question 8 of 15

During a risk assessment it was concluded that the value of an asset was less than the cost of the security control needed to protect it from an identified risk. Because of this, it has been decided not to use the control but still utilize the asset. What type of risk management strategy is being used?

  • Transference

  • Avoidance

  • Acceptance

  • Mitigation

Question 9 of 15

A security analyst, reviewing alerts from an Endpoint Detection and Response (EDR) system, notices suspicious command-line activity on a user's workstation indicative of a malware infection. The analyst needs to contain the threat while preserving evidence for a forensic investigation. What is the BEST immediate action for the analyst to take?

  • Isolate the workstation from the network but leave it powered on.

  • Run a full antivirus scan on the workstation while it remains connected to the network.

  • Immediately power off the workstation to stop the malware's execution.

  • Disconnect the workstation from the network and immediately re-image it from a known-good backup.

Question 10 of 15

Your employer has a large team of software developers with constantly changing codebases for dozens of internal applications. As a part of change control any code changes go through an automated vulnerability scanning process which checks for known vulnerabilities in frameworks, programming languages, dependencies and the code itself. Due to business pressure these scans have been largely ignored and there are currently over a thousand issues found by the automated scanning. You are tasked with working with the developers and remedying 100% of the issues. What should you do next?

  • Organize the vulnerabilities by criticality and begin planning for solutions for the most critical vulnerabilities first

  • Implement an approval step for all code changes that requires no security issues prior to updates

  • Identify any false positives to reduce the number of items to remediate

  • Stop all deployments, code changes and updates until the vulnerabilities are fixed

Question 11 of 15

During a routine assessment, a security analyst is tasked with using OSINT to identify potential vulnerabilities that could affect their organization’s network infrastructure. Which of the following methods would BEST support this activity?

  • Reviewing the organization’s website source code on the production server for misconfigurations

  • Using search engines to discover discussions and reports on new vulnerabilities affecting similar network infrastructure

  • Attending industry conferences to gather insights on common network infrastructure issues

  • Analyzing social media profiles of the organization’s IT staff for potential leads on system flaws

Question 12 of 15

A security analyst is reviewing an infrastructure-as-a-service (IaaS) cloud that hosts many customer virtual machines on the same physical hardware. The analyst is concerned that a flaw in the virtualization layer could let one virtual machine break isolation, compromise the hypervisor, and gain control over every other guest. Which cloud threat identified by the Cloud Security Alliance does this scenario BEST illustrate?

  • Insecure interfaces and APIs

  • Shared technology vulnerabilities

  • Data breaches

  • Account hijacking

Question 13 of 15

A company has multiple online services with different compute requirements, ranging from high-intensity processing for video rendering to low-intensity processes for a document storage system. The CTO wants to ensure that these services remain operational with minimal disruption in the event of a hardware failure. Which of the following solutions would BEST address the compute resilience needs for the company's diverse set of services?

  • Clustered servers with resource balancing

  • Decentralized servers without load balancing

  • Single powerful server with a hot spare

  • Multiple air-gapped systems for each service

Question 14 of 15

Which of the following is the BEST deployment option for a company looking to enhance the security of their web applications by monitoring and potentially blocking SQL injection attacks and cross-site scripting attempts?

  • Install a host-based firewall on the web application server.

  • Deploy a specialized Web application firewall in front of the web server environment.

  • Block port HTTP/80 to ensure traffic is encrypted over HTTPS/443 and immune to SQL Injections

  • Implement a network-based firewall at the network perimeter.

Question 15 of 15

Your organization is handling sensitive government contracts and must ensure that information related to these projects is guarded against unauthorized physical access. In accordance with data classification policies, which of the following is the BEST way to handle such data?

  • Institute policies for secure disposal of printouts and storage media containing the data

  • Encrypt all data and frequently change encryption keys

  • Store the data in a physically secure location and enforce strict access controls

  • Enable detailed logging of all access to the data for audit purposes