00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

A financial services company must comply with an industry regulation that requires an independent review of their security posture. Which of the following BEST ensures the company’s ongoing compliance with this requirement?

  • Incorporating a right-to-audit clause in third-party vendor agreements

  • Generating internal compliance reports quarterly

  • Performing an independent third-party audit

  • Conducting a self-assessment using internal resources

Question 2 of 20

A web developer implements a form where users select their country from a drop-down menu. The developer believes this is secure from SQL injection because the user cannot type into the field. Why is this security measure insufficient on its own?

  • An attacker can intercept and modify the HTTP request before it reaches the server.

  • Drop-down menus are only secure when used with numeric values.

  • SQL injection attacks can only be performed on text input fields, not selection menus.

  • JavaScript-based validation on the form would prevent this attack.

Question 3 of 20

A large organization has implemented several security measures to protect its network infrastructure. As part of their continuous monitoring strategy, they want to ensure that any unauthorized access or anomalies in their network traffic are quickly identified and investigated. Which of the following security measures would best serve this purpose?

  • Deploy additional firewalls to segment network traffic.

  • Implement an Intrusion Detection System (IDS) to monitor network traffic.

  • Increase frequency of anti-virus software updates on all endpoints.

  • Conduct regular security training sessions for all network administrators.

Question 4 of 20

What type of risk assessment is conducted as needed, often in response to specific events or changes in the environment?

  • Continuous

  • Ad Hoc

  • Qualitative

  • Recurring

Question 5 of 20

Asymmetric (public-key) cryptography is frequently used to protect the confidentiality of e-mail and web traffic. Which of the following statements BEST explains how asymmetric encryption achieves this confidentiality during data transmission?

  • A single shared secret key is exchanged over a secure channel and used for both encryption and decryption.

  • The sender signs the data with their private key so that anyone with the public key can decrypt and read it.

  • Data is split across redundant drives so that no single drive stores the entire plaintext.

  • The sender encrypts the data with the recipient's public key, ensuring that only the corresponding private key can decrypt the message.

Question 6 of 20

A company is assessing various options to enhance the security of their facility and data center. Which of the following would serve as the best deterrent control to discourage trespassers from entering the secured premises of the data center?

  • Deploying mantraps at the primary entrance to the data center

  • Implementing badge readers at all points of entrance and exit

  • Erecting security awareness posters regarding tailgating in employee areas

  • Installing highly visible security cameras around the perimeter and entry points

Question 7 of 20

A security analyst is tasked with implementing a solution to receive timely data on emerging malware, malicious IP addresses, and known vulnerabilities. Which of the following would BEST fulfill this requirement?

  • A threat feed

  • A vulnerability scanner

  • A Security Information and Event Management (SIEM) system

  • A security baseline

Question 8 of 20

Which of the following is the BEST description of the purpose of version control in the context of change management and security?

  • To automatically update documentation and diagrams when changes are made

  • To manage and control software code, configurations, and other artifacts

  • To quickly identify and resolve issues caused by recent changes

  • To facilitate collaboration between different teams and departments

Question 9 of 20

Which of the following is an example of a possession factor that could be used for multi-factor authentication?

  • A password

  • A hardware authentication token

  • A mobile app authorization request

  • Eye color

Question 10 of 20

When conducting a risk analysis, what is the term used to describe the probability that a given threat is capable of exploiting a particular vulnerability within an organization's security?

  • Threat Level

  • Likelihood

  • Vulnerability

  • Impact

Question 11 of 20

During an overhaul of its onboarding process, a mid-sized company wants to weave security controls into every step that a new employee takes on their first day. Which change to the documented onboarding procedure would be the most effective at protecting corporate assets while still enabling new hires to be productive?

  • Access to internal resources is immediately granted to new hires, with a formal security orientation scheduled after their first month of employment.

  • Full network access is granted on the first day with a briefing held by the security team, supplemented by email reminders about security policies.

  • Network credentials are provided after completion of comprehensive security training on the first day, followed by access that is scaled up based on role-specific requirements.

  • New hires are given minimal guidance to encourage self-learning about security practices, providing full access to internal systems to promote immediate immersion.

Question 12 of 20

Which of the following options is a functionality or tool that disallows access to a wireless network based on the Layer 2 address of the client device?

  • WPA2

  • MAC address filtering

  • Split tunnel VPN

  • ACL

Question 13 of 20

An organization is conducting a Business Impact Analysis. Which metric should be determined to establish the maximum time frame that a critical system can be disrupted before severe impact to business operations occurs?

  • Establishing the data backup frequency is necessary for scheduling maintenance windows.

  • Determining the maximum tolerable downtime for critical systems, otherwise known as the Recovery Time Objective, is essential for prioritizing their restoration.

  • Assessing the annual likelihood of a system failure occurring will forecast the potential interruptions in operations.

  • Calculating the cost of system outages per day can provide insight into potential financial losses.

Question 14 of 20

A company wants to enhance its security by implementing an additional authentication factor to their current system that uses passwords. Which of the following would be the MOST secure biometric authentication method to add?

  • Implementing fingerprint scanning

  • Setting up voice recognition systems

  • Installing key fob devices

  • Using facial recognition technology

Question 15 of 20

An organization wants to discourage potential intruders by signaling that security measures are in place. By installing visible security cameras and posting warning signs around their premises, which type of control are they implementing?

  • Corrective Control

  • Preventive Control

  • Deterrent Control

  • Detective Control

Question 16 of 20

Considering your current network security setup only provides notifications when potential security breaches occur, which enhancement would allow the system to not just detect but also proactively counteract malicious traffic?

  • Incorporate additional security information and event management (SIEM) features

  • Bolster the organization's data loss prevention (DLP) strategies

  • Implement a system with automatic threat mitigation capabilities

  • Enhance the cryptographic assurance using public key infrastructure (PKI)

Question 17 of 20

An organization seeks to enhance its physical security measures to control access to sensitive areas. They require a solution that can accurately authenticate individuals based on intrinsic characteristics unique to each person. Which of the following solutions would BEST meet this requirement?

  • Implementing biometric access controls

  • Installing surveillance cameras at entry points

  • Issuing access badges with magnetic stripes

  • Assigning security personnel to monitor entrances

Question 18 of 20

Your company, SecureTech Inc., specializes in developing financial software. As part of the Risk Management team, you have been tasked with analyzing the potential risks associated with a newly identified software vulnerability that could allow unauthorized access to financial data. Which of the following would best categorize the risk in terms of the impact to your organization should this vulnerability be exploited?

  • Insignificant impact

  • Low impact

  • High impact

  • Acceptable impact

Question 19 of 20

A systems administrator needs to add an endpoint control that will stop known viruses, worms, Trojans, and ransomware from executing on corporate laptops while allowing any detected malicious files to be quarantined or deleted. Which of the following security tools BEST fulfills this requirement?

  • Endpoint antivirus/anti-malware agent

  • Continuous data-backup client

  • Full-disk encryption software

  • Performance-optimization utility

Question 20 of 20

What is the primary function of a hashing algorithm within the realm of cybersecurity?

  • To encrypt data so that it can be securely transmitted over public networks

  • To serve as the public key within a public-private key pair used for asymmetric encryption

  • To generate a unique 'fingerprint' of data that can be used to verify its integrity

  • To compress data to save storage space before transmitting over a network