00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

A company posts large signs that read "This area is under video surveillance" around its server room, and the CCTV cameras themselves are mounted in plain sight. Which type of security control do these two measures MOST directly represent?

  • Corrective control

  • Detective control

  • Preventive control

  • Deterrent control

Question 2 of 20

System logs show that one employee account has two active sessions: one originating from New York, USA and another from Singapore only minutes apart-far too quickly for the user to have physically traveled. Which security concern does this situation most likely indicate?

  • Time-of-check vs. time-of-use race conditions

  • Concurrent sessions from multiple locations

  • Amplified DDoS attack leveraging multiple endpoints

  • Credential spraying across the network

Question 3 of 20

Before beginning a penetration test, a document must be established to outline the boundaries and methods of the test. Which document is specifically designed for this purpose?

  • A detailed document specifying tasks to be completed under a contract, often as part of a larger agreement

  • A document that outlines the delivered services, their standards, and the legal framework for ongoing relationships

  • A document that specifies the actions, scope, methods, and protocols to be adhered to during a penetration test

  • A document that formalizes the mutual understanding and general intent of the collaborating parties

Question 4 of 20

Your company has historically avoided issuing company-owned mobile or wireless devices. A new initiative now seeks to provide laptops to employees, but leadership requires that any data stored locally on the device be encrypted at all times. Which type of drive would meet this requirement?

  • Full-disk encryption software (BitLocker)

  • Self-encrypting drive (SED)

  • RAID 0 array

  • Virtual private network (VPN)

Question 5 of 20

During a security governance workshop, a company is mapping roles to responsibilities for its new payroll application and the underlying database. According to best practices for systems and data governance, which role is responsible for approving and overseeing the development, maintenance, use, and security controls of these assets?

  • Third-party service providers who process data on behalf of the data owner or controller.

  • Teams responsible for performing regular audits and compliance checks on data management practices.

  • Personnel who physically interact with the data on a daily basis, ensuring its accuracy and integrity.

  • An individual or entity that has approved management responsibility for controlling the production, development, maintenance, use, and security of assets.

Question 6 of 20

During a third-party risk assessment your organization develops its own vendor security questionnaire. The form is tailored to the service being purchased and asks detailed questions about authentication, data protection, and incident response, but it is not explicitly mapped to any well-known framework such as NIST CSF or ISO/IEC 27001.

Which statement BEST describes the role of security frameworks in this situation?

  • Using a framework is discouraged because it makes questionnaires too lengthy and compliance-focused.

  • Mapping each question to a recognized framework is mandatory; without it the questionnaire cannot be considered reliable.

  • Framework mapping is required only when assessing cloud service providers; it is unnecessary for other vendor types.

  • Framework mapping is helpful, but a well-tailored questionnaire that covers the vendor's relevant risk areas can still be effective without a formal cross-reference.

Question 7 of 20

Which of the following physical security measures is primarily used to monitor and record activity for later review?

  • Video Surveillance

  • Bollards

  • Lighting

  • Access Control Vestibule

Question 8 of 20

A financial company has decided to implement an additional security layer for accessing its internal customer database system to ensure that only authenticated and authorized employees can view sensitive customer information. The system now requires an access code from a hardware token in addition to the username and password. This change primarily strengthens which element of AAA?

  • Authorization

  • Authentication

  • Accounting

  • Non-repudiation

Question 9 of 20

What is the purpose of a security key in multifactor authentication?

  • A software tool that records the keystroke dynamics of a user for continuous authentication.

  • An application on a user's device that sends a verification code via SMS messages.

  • A physical device that, when presented, serves as a second factor by verifying the user's possession.

  • An algorithm embedded within the user's computer that generates one-time passwords.

Question 10 of 20

After normal business hours, an administrator notices an abnormal pattern of login failures affecting several high-privilege accounts. The source of these attempts shifts methodically across a range of network addresses. Which characteristic of these security events should the administrator prioritize for further investigation?

  • Repeated login failures pointing to a potential configuration error.

  • The methodical shift across a range of network addresses indicating automation.

  • The high-privilege account lockouts due to suspected user error.

  • An issue with the authentication service failing to validate credentials.

Question 11 of 20

Your organization has implemented strong internal controls to manage sensitive customer data. During a routine internal audit, you discover that a newly implemented software tool does not comply with the established encryption standards. What is the next step to maintain compliance?

  • Immediately cease using the tool across the organization until it complies with encryption standards.

  • Request a feature update from the software tool vendor to accommodate the required encryption standards without internal notification.

  • Document the issue and wait for the next external audit to confirm the non-compliance before taking action.

  • Report the non-compliance issue to the compliance department for review and correction.

Question 12 of 20

A corporation is evaluating the possible financial impact of an internal network compromise. With the internal network assets valued at $2 million, which of the following best illustrates the 'Exposure Factor' for this risk assessment?

  • The $2 million total value of the network assets that are at risk.

  • The annual amount required to insure the $2 million worth of network assets against compromise.

  • The likelihood, expressed as a percentage, that the network assets will be compromised each year.

  • The estimated percentage of the $2 million that would be lost if the network is compromised.

Question 13 of 20

A systems administrator must remotely manage a Linux server that can be reached only over the public internet. Which of the following protocols will provide an encrypted channel that protects the administrator's credentials and all session data from eavesdropping?

  • HTTP

  • SSH

  • Telnet

  • SNMPv1

Question 14 of 20

A company is enhancing its disaster recovery strategies to improve its ability to maintain continuity of operations after a catastrophic system failure. Considering the importance of being able to resume mission-critical activities swiftly and efficiently, which of the following options should be the company's MAIN focus?

  • Transitioning to a warm site that can be operational within a few days of an incident

  • Setting up a cold site with basic infrastructure and no pre-installed systems

  • Implementing more frequent backups of all critical systems

  • Establishing a hot site to facilitate immediate failover

Question 15 of 20

Which of the following best describes a scenario where an individual has the right to have their personal data erased from an organization's database upon request?

  • Right to Be Forgotten

  • Ownership Assertion

  • Data Subject Access

  • Data Inventory and Retention

Question 16 of 20

As a security consultant evaluating an organization's data management practices, you determine that there is a need to appoint an individual responsible for making decisions about the data, establishing control mechanisms, and determining data classification levels. Which role is best suited for these responsibilities?

  • Processor

  • Owner

  • Controller

  • Custodian/Steward

Question 17 of 20

Which type of threat actor is MOST likely to engage in activities aiming to obtain sensitive information from an organization to demand payment in return for not releasing the information?

  • Organized crime

  • Nation-state

  • Hacktivist

  • Unskilled attacker

Question 18 of 20

An attacker infiltrates a company's network and steals customer credit card information. What is the likely motivation behind this attack?

  • Data exfiltration

  • Revenge

  • Espionage

  • Financial gain

Question 19 of 20

What is the primary purpose of implementing automation in vulnerability management processes?

  • To completely eliminate user error in vulnerability management.

  • To ensure manual processes are the primary method for vulnerability detection.

  • To increase efficiency and consistency in vulnerability detection and response.

  • To eliminate the necessity of establishing secure baselines for systems.

Question 20 of 20

Which of the following options is a vendor-neutral standard for message logging?

  • syslog

  • SIEM

  • Event manager

  • SNMP