00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

Which approach aligns with the security principle that dictates user permissions should be limited to the bare minimum necessary to accomplish their work tasks?

  • Providing users with read-write access to all network devices

  • Granting full rights to all users to avoid performance bottlenecks

  • Assigning permissions based strictly on job requirements

  • Applying time-of-day restrictions to user logins

Question 2 of 15

Which solution aggregates logs and other security data from various hardware and software systems in an organization to assist in identifying and managing potential security incidents?

  • Intrusion Detection System

  • Security Information and Event Management system

  • Network Management with Simple Network Management Protocol traps

  • Data Loss Prevention system

Question 3 of 15

An administrator is reviewing the organization's disaster recovery plan and wants to confirm that critical files can be brought back online after a ransomware attack. Which of the following activities BEST demonstrates that the backup strategy will enable a full recovery?

  • Encrypting the backup archives with AES-256.

  • Performing a periodic restoration test in a nonproduction environment.

  • Storing backup tapes in an offsite, climate-controlled vault.

  • Scheduling differential backups to run every hour.

Question 4 of 15

A company wants to minimize the exposure of sensitive customer credit card data within its e-commerce environment. Which of the following data protection strategies would BEST reduce the risk of credit card data breaches while maintaining the ability to perform transactional operations?

  • Masking

  • Geolocation

  • Tokenization

  • Encryption

Question 5 of 15

A company is assessing various options to enhance the security of their facility and data center. Which of the following would serve as the best deterrent control to discourage trespassers from entering the secured premises of the data center?

  • Implementing badge readers at all points of entrance and exit

  • Installing highly visible security cameras around the perimeter and entry points

  • Erecting security awareness posters regarding tailgating in employee areas

  • Deploying mantraps at the primary entrance to the data center

Question 6 of 15

When implementing changes to a system, which component ensures that if the change fails, the system can be restored to its previous state?

  • Backout Plan

  • Change Approval

  • Impact Analysis

  • Maintenance Window

Question 7 of 15

Which type of threat actor is typically characterized by having significant resources, potentially governmental backing, and engages in cyber activities for reasons such as espionage or to gain strategic advantages?

  • Hacktivist

  • Nation-state

  • Insider threat

  • Unskilled attacker

Question 8 of 15

A network administrator needs to devise a strategy to optimize resource utilization when web-traffic spikes unpredictably, while also avoiding a single point of failure in the web-service infrastructure. Which configuration best meets these business requirements?

  • Create a server cluster for redundancy

  • Introduce a load balancer to distribute the traffic

  • Deploy a reverse proxy to manage web requests

  • Implement RAID configurations for all web servers

Question 9 of 15

A security administrator is deploying a firewall solution specifically to protect a public-facing web server from attacks like SQL injection and cross-site scripting (XSS). At which layer of the OSI model does this type of specialized firewall primarily operate?

  • Layer 3 (Network)

  • Layer 4 (Transport)

  • Layer 2 (Data Link)

  • Layer 7 (Application)

Question 10 of 15

Which concept refers to designing a system capable of handling increased demand by adding resources?

  • Availability

  • Redundancy

  • Scalability

  • Resilience

Question 11 of 15

A company's primary data center located in a hurricane-prone area has just experienced a significant storm, leading to a sustained power outage and compromised physical infrastructure. The company relies on a combination of on-site back-ups and replication to an off-site data center for their disaster recovery strategy. Given these details, which of the following would BEST ensure the continuation of business operations during this event?

  • Restoring operations from onsite backups as soon as connectivity is re-established.

  • Waiting until the primary data center is restored to resume critical business operations.

  • Implementing incremental backups until the primary data center is restored and operational.

  • Activating the business continuity plan which includes failing over to the off-site data center.

Question 12 of 15

What type of network is especially vulnerable to eavesdropping due to its broadcast nature, making it essential to encrypt sensitive data?

  • Near Field Communication (NFC)

  • Bluetooth

  • Wired

  • Wireless

Question 13 of 15

A security administrator needs to ensure that proprietary data remains confidential while remote employees access it from off-site locations over the internet. Which of the following is the BEST solution to protect this data in transit?

  • Install a web application firewall (WAF) in front of the corporate web servers.

  • Require multi-factor authentication (MFA) for all user accounts.

  • Enable Transport Layer Security (TLS) on all public-facing web services.

  • Implement a Virtual Private Network (VPN) for remote access.

Question 14 of 15

An IT security analyst at a financial institution has been tasked to inspect a suspected compromised workstation after several employees reported unusual activity. The analyst needs to verify if a keylogger software is installed on the system. Which of the following actions is MOST effective in determining the presence of keylogging software on the workstation?

  • Review the list of running processes and installed programs on the system.

  • Examine outbound network traffic for transmission of sensitive data to unauthorized destinations.

  • Ensure that the operating system and security software are up to date with the latest patches.

  • Check for unusual file permissions on critical system files and directories.

Question 15 of 15

Which of the following is the BEST method for an organization to proactively engage with the security community and offer a structured means of reporting vulnerabilities identified within its systems or applications?

  • Develop an incident response team

  • Establish a responsible disclosure program

  • Implement a formal change management procedure

  • Regularly perform penetration tests