00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

Which legal principle establishes the right of individuals to request the removal of their personal information from organizational databases or records, especially in cases where the information is no longer relevant or accurate?

  • Information Custodian

  • Data Retention

  • Right to Be Forgotten

  • Data Sovereignty

Question 2 of 20

A corporation employs external auditors who require access to the company's server infrastructure for a limited duration. The security policy enforces minimum necessary privileges and mandates that access credentials should expire immediately after the auditing task is completed. Which of the following practices should be implemented to comply with the security policy?

  • Allocating time-restricted access tokens for server access

  • Generating non-expiring API keys for auditors to use during their review

  • Issuing a set of shared credentials that the audit team can use

  • Creating permanent accounts with privileged access for each auditor

Question 3 of 20

Which of the following is most effective in preventing an attacker from easily guessing or cracking a password?

  • Avoiding the use of special characters in the password

  • Using a password without any numeric characters

  • Setting the password expiration to 90 days

  • Increasing the number of characters in the password

Question 4 of 20

Data integrity is the concept that you can trust that a piece of data is complete and has not been altered or tampered with. Which of the following technologies can be used to ensure the integrity of data?

  • Authentication

  • Confidentiality

  • Checksum

  • Encryption

Question 5 of 20

Which of the following best describes the process implemented to prevent data from being recovered from a storage device?

  • Sanitization

  • Compression

  • Encryption

  • Degaussing

Question 6 of 20

A security administrator is deploying a firewall solution specifically to protect a public-facing web server from attacks like SQL injection and cross-site scripting (XSS). At which layer of the OSI model does this type of specialized firewall primarily operate?

  • Layer 3 (Network)

  • Layer 2 (Data Link)

  • Layer 7 (Application)

  • Layer 4 (Transport)

Question 7 of 20

A domain's DNS includes the record 'v=spf1 -all', suggesting that emails can originate from any mail server, and thus, messages should be assumed legitimate regardless of the originating mail server.

  • True

  • False

Question 8 of 20

Your organization has just finalized an incident-response playbook for suspected data breaches. During a tabletop exercise, a junior analyst asks where to look in the document to determine who is responsible for tasks such as notifying management, containing affected systems, and coordinating with legal counsel. Which section of the playbook should the analyst consult first to identify these assignments?

  • Roles and Responsibilities

  • Communication Plan

  • Recovery Methods

  • Incident Response Procedures

Question 9 of 20

As the security analyst for a financial institution, you uncover repeated failed login attempts against a user account during off-hours. The source addresses resolve to a country where the company has no employees or offices. Based on the threat-actor attribute of location, which type of actor is most likely responsible?

  • An external threat actor operating outside the organization

  • An unskilled attacker (script kiddie) located on the internal network

  • Shadow IT personnel using unapproved cloud services

  • An insider threat from a current employee with authorized access

Question 10 of 20

A network administrator needs to devise a strategy to optimize resource utilization when web-traffic spikes unpredictably, while also avoiding a single point of failure in the web-service infrastructure. Which configuration best meets these business requirements?

  • Deploy a reverse proxy to manage web requests

  • Create a server cluster for redundancy

  • Introduce a load balancer to distribute the traffic

  • Implement RAID configurations for all web servers

Question 11 of 20

During the analysis phase of an incident, an analyst is tasked with determining the scope of a suspected breach on several servers. Which data source will MOST likely provide the comprehensive information required to assess the activities on the affected servers?

  • Firewall logs

  • Packet captures

  • Vulnerability scans

  • Operating system-specific security logs

Question 12 of 20

An organization is reviewing its security policies to better protect against unauthorized access to employee accounts. Which of the following would be the BEST mitigation strategy to prevent a brute force attack on user passwords?

  • Disabling unused accounts

  • Implementing strong password policies that require complex passwords

  • Enabling account lockouts after a specified number of failed login attempts

  • Monitoring for unauthorized access attempts on user accounts

Question 13 of 20

A security administrator is tasked with protecting the confidentiality of data stored on company laptops. The administrator decides to implement full-disk encryption. Which of the following control types BEST describes this implementation?

  • Preventive

  • Corrective

  • Detective

  • Deterrent

Question 14 of 20

Your organization requires a solution to monitor the health and security status of its endpoints. What kind of solution would you deploy to ensure centralized management and real-time alerting for potential security issues?

  • Regularly schedule manual security audits of all endpoints to check for software updates and configuration issues.

  • Set up a network analyzer to capture and inspect all traffic in and out of the network.

  • Use a centralized log management platform to passively analyze system logs.

  • Deploy an agent-based monitoring tool on all endpoints that reports back to a central management console.

Question 15 of 20

Which type of attack involves using a phone call to deceive someone into revealing confidential information?

  • Phishing

  • Vishing

  • Tailgating

  • Smishing

Question 16 of 20

An organization wants to discourage potential intruders by signaling that security measures are in place. By installing visible security cameras and posting warning signs around their premises, which type of control are they implementing?

  • Detective Control

  • Preventive Control

  • Deterrent Control

  • Corrective Control

Question 17 of 20

During an organization's security policy review meeting, it was observed that there is currently no formal policy pertaining to the acceptable use of organizational assets and network resources. As part of establishing robust security governance within the company, which of the following policies should be proposed and implemented first to address this issue?

  • Disaster Recovery Policy

  • Change Management Policy

  • Acceptable Use Policy (AUP)

  • Software Development Lifecycle (SDLC) Policy

Question 18 of 20

Upon discovering a data breach involving unauthorized access to the customer records system, what is the PRIMARY action the security team should focus on according to standard security protocols?

  • Start documenting the details of the breach and response actions taken.

  • Immediately isolate affected systems to stop the spread of the breach.

  • Notify the company's legal team and prepare for public disclosure.

  • Prioritize the review of security logs to trace the origin of the attack.

Question 19 of 20

When implementing hardening techniques on a company's main database server to minimize its attack surface, which of the following measures should be taken FIRST?

  • Configure the firewall to allow only essential traffic.

  • Update the server to the latest stable OS version and apply all available security patches.

  • Conduct a vulnerability scan to identify and fix security flaws.

  • Implement account lockout policies after several failed login attempts.

Question 20 of 20

An IT security team has implemented fake files in the organization's network to deceive and trap potential attackers. These resources appear operational and contain seemingly valuable data but are monitored closely for interaction to detect malicious activity. Which of the following best describes these fake resources?

  • Honeypot

  • Honeynet

  • Honeytoken

  • Intrusion Detection System (IDS)