00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

An organization's Intrusion Detection System (IDS) recently flagged numerous failed login attempts on a server from a single IP address within a short period. What type of activity is MOST likely being detected?

  • Brute force attack

  • Phishing attempt

  • Port scanning

  • Distributed Denial of Service (DDoS) attack

Question 2 of 15

What term best describes an attribute of a security architecture focused on continuing service delivery in the event of component failures or other issues?

  • Scalability

  • Resilience

  • Maintainability

  • Responsiveness

Question 3 of 15

Which of the following best defines the role of an owner within the context of systems and data governance?

  • Teams responsible for performing regular audits and compliance checks on data management practices.

  • An individual or entity that has approved management responsibility for controlling the production, development, maintenance, use, and security of assets.

  • Third-party service providers who process data on behalf of the data owner or controller.

  • Personnel who physically interact with the data on a daily basis, ensuring its accuracy and integrity.

Question 4 of 15

You work for a large national realty company in the networking department. Recently your department received a help desk call from a smaller satellite office stating their WiFi is no longer working. The trouble ticket was escalated to you because company policy does not allow wireless networks. After further investigation you learn that an employee in the office setup a simple wireless router themselves. Which option best defines this situation?

  • Disassociation

  • Evil twin

  • Rogue AP

  • Unauthorized twin

Question 5 of 15

After a recent firewall change, several users report they can reach the internal intranet site but cannot browse any external websites. You discover that HTTPS traffic is being blocked. Which firewall port must be opened so users can securely access public websites again?

  • 3389

  • 443

  • 8080

  • 80

Question 6 of 15

Which set of rules is typically used by an organization to define the complexity and renewal frequency requirements for user credentials?

  • Audit guidelines

  • Network configuration protocols

  • Data classification standards

  • Password policy

Question 7 of 15

During a review process against the organization's security objectives and regulatory compliance needs, disparities were discovered, indicating that certain control measures are inadequate. Which course of action best aligns with recommended practice for addressing these deficiencies?

  • Deploy an advanced intrusion detection system immediately across the network to mitigate any vulnerabilities.

  • Create an actionable remediation plan outlining steps to bridge the identified security gaps and align with the desired benchmarks.

  • Initiate a series of in-depth security training sessions to address every gap identified in the review.

  • Revise security policies immediately to the levels of the industry standards discovered during the review, without a structured plan.

Question 8 of 15

A company's board of directors establishes a general willingness to accept a certain level of risk to achieve its strategic objectives. This is defined as the company's risk appetite. During project planning, a specific project is allowed to exceed this general level by a specified, measurable amount. What is this acceptable deviation from the risk appetite called?

  • Risk tolerance

  • Risk appetite

  • Risk identification

  • Risk register

Question 9 of 15

A company is preparing to roll out a major update to one of its critical applications. The update includes new features and security patches. Prior to deployment, the security team wants to ensure that they can quickly revert to the previous stable version in case of unexpected problems with the new release. Which method would BEST ensure that they can manage and control application versions effectively?

  • Update the disaster recovery plan to include steps for reverting application updates.

  • Implement a version control system to manage application updates and rollbacks.

  • Deploy an automated patch management tool to handle version updates.

  • Create regular manual backups of the application's installation directory.

Question 10 of 15

As a network architect, you have been asked to design a network infrastructure for a financial services provider that requires extremely high levels of security due to the sensitive nature of the data being processed. The client also demands that certain systems must remain operational and isolated even in the event of a catastrophic network failure. Which of the following solutions would BEST meet these requirements?

  • Implementing an air-gapped network for those critical systems

  • Deploying an Intrusion Prevention System (IPS) throughout the network

  • Implementing a Virtual Private Network (VPN) for all internal communications

  • Creating logical segmentation of the network using VLANs

Question 11 of 15

A company's web application is vulnerable to a type of attack where unauthorized commands are sent from a user that the web application trusts. Which of the following is the BEST mitigation technique to prevent this type of vulnerability?

  • Employ parameterized queries

  • Implement strict input validation

  • Adopt a strong content security policy

  • Use anti-CSRF tokens

Question 12 of 15

In an effort to streamline client interaction processes, a business is transitioning to a sophisticated platform designed for this purpose. The analytics division requires permissions to generate reports and review client data, while the account management division needs the ability to engage with and alter client records. What is the BEST strategy for assigning the appropriate level of system access in accordance with each division's responsibilities?

  • Allow division heads to grant access as they see fit for their respective teams

  • Utilize a predefined set of roles that are specific to user job functions to regulate access within the platform

  • Institute a policy where access is determined by the seniority of the personnel within the organization

  • Grant all divisions the same level of access to simplify management of the new platform

Question 13 of 15

A company is reviewing its disaster recovery plan to ensure that the amount of data loss in the event of a disaster does not exceed business operational tolerances. Which metric should be assessed to determine the optimal frequency of data backups?

  • Recovery Time Objective (RTO)

  • Single Loss Expectancy (SLE)

  • Recovery Point Objective (RPO)

  • Annualized Loss Expectancy (ALE)

Question 14 of 15

During a routine update, an IT administrator accidentally overwrites crucial configuration files, causing incorrect data to be displayed to users. Which fundamental security principle is most impacted by this incident?

  • Confidentiality

  • Availability

  • Authentication

  • Integrity

Question 15 of 15

Your coworker is out sick due to an illness. In his absence you have received the results of a vulnerability scan he ordered from an external provider. Unfortunately your coworker did not give you any information on what type of scan was conducted or what methods were used. The results show that 3 injection vulnerabilities were identified but are only possible when attempted from an authenticated user account. Based on the information you have, what type of vulnerability scan was most likely completed?

  • Gray box

  • Intrusive

  • Credentialed

  • Non-intrusive