00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

An organization is considering updating their wide area network architecture to improve the management of security policies and the application of security updates across the network. What is the PRIMARY security benefit of transitioning to a Software-Defined Wide Area Network?

  • Optimized performance through application-aware routing

  • Centralized management of security policies and updates

  • Dynamic path selection for bandwidth optimization

  • Reduction in operational costs by utilizing virtualization

Question 2 of 20

A multinational corporation with operations in several countries is working to ensure compliance with global data protection regulations. What is the most appropriate action for the company to take in order to maintain compliance with the diverse set of regulations concerning user data privacy?

  • Delegate the responsibility for compliance with data protection laws to the IT department of each local office.

  • Create a data retention policy that focuses on adhering to the least restrictive data protection standards to ensure ease of data flow.

  • Establish a data governance framework that complies with the highest standard among the international data protection regulations.

  • Set up an external compliance team dedicated to each region to handle region-specific data privacy laws.

Question 3 of 20

During an audit as a third party security consultant you are told that the organization being audited conducts an exercise annually during which prominent IT staff and the security team gather in a meeting room and discuss how they would handle various security incidents and disaster scenarios. This exercise is then used to update any policies and playbooks. What type of exercise are they describing?

  • Business Impact Exercise (BIE)

  • Dungeons and Dragons (DND)

  • Tabletop Exercise

  • Incident Response Planning (IRP)

  • DR Planning

Question 4 of 20

A security manager is trying to calculate the expected monetary loss from data breach incidents that historically happen twice each fiscal year. If the average cost for each data incident is estimated to be $50,000, what is the BEST estimate for the yearly financial impact of these breaches?

  • The yearly financial impact is estimated to be $200,000.

  • The yearly financial impact is estimated to be $50,000.

  • The yearly financial impact is estimated to be $25,000.

  • The yearly financial impact is estimated to be $100,000.

Question 5 of 20

What technique enhances the security of a password by adding random data to it before it's hashed?

  • Tokenization

  • Hashing

  • Key Stretching

  • Salting

Question 6 of 20

Your organization wants to test its cybersecurity defenses. A penetration test is conducted without making those responsible for defense aware of the test. This type of test is done by which of type of team?

  • Red

  • Blue

  • White

  • Purple

Question 7 of 20

Your company has recently rolled out a new security awareness training program focused on recognizing social engineering attacks. To ensure the effectiveness of the training, what is the MOST effective method to evaluate employee understanding and application of the training content?

  • Publishing a quarterly newsletter highlighting social engineering threats

  • Including a quiz at the end of the training session

  • Unannounced network scans after training completion

  • Conducting unannounced phishing simulation campaigns

Question 8 of 20

A new company policy requires hardware encryption for certain highly confidential systems. These existing systems do not already have a hardware component that can provide this functionality. What is the easiest way to implement this new policy?

  • Hardware Security Module

  • RADIUS

  • Trusted Platform Module

  • PKI

Question 9 of 20

A company's competitor has been found to be spreading false information about the company's financial stability, intending to manipulate stock prices and discredit the company in the eyes of investors and customers. This deliberate spread of misleading content is intended to cause harm to the company. What type of activity does this scenario best exemplify?

  • Hacking

  • Disinformation

  • Phishing

  • Whaling

Question 10 of 20

A company is preparing to roll out a major update to one of its critical applications. The update includes new features and security patches. Prior to deployment, the security team wants to ensure that they can quickly revert to the previous stable version in case of unexpected problems with the new release. Which method would BEST ensure that they can manage and control application versions effectively?

  • Update the disaster recovery plan to include steps for reverting application updates.

  • Deploy an automated patch management tool to handle version updates.

  • Implement a version control system to manage application updates and rollbacks.

  • Create regular manual backups of the application's installation directory.

Question 11 of 20

Your organization is looking to enhance its disaster recovery capabilities to ensure business continuity after an unexpected event. Which type of site provides an on-demand, operational environment that can be quickly made ready to resume critical business functions with all of the necessary hardware and software?

  • Cold site

  • Warm site

  • Mobile site

  • Hot site

Question 12 of 20

A company's proprietary application is critical for daily operations, but it runs on an operating system that no longer receives vendor updates. The company's IT team is currently unable to upgrade the system or migrate the application due to compatibility issues. What is the most effective risk mitigation strategy the IT team should implement to secure the legacy system against potential threats?

  • Increase security monitoring specifically targeting the unsupported system to detect anomalies

  • Implement network segmentation and restrict the system's network connectivity to essential services

  • Conduct regular security audits on the system to ensure compliance with security policies

  • Encourage users to employ stronger passwords for system access

Question 13 of 20

Which security control should a bring-your-own-device (BYOD) policy require on all personally owned smartphones and laptops that access or store company data in order to mitigate the risk of data exposure if the device is lost or stolen?

  • Disable near-field communication (NFC) on the device

  • Enforce geofencing so the device works only on-site

  • Set the screen-lock timeout to 30 minutes

  • Require full-disk (device) encryption

Question 14 of 20

An organization wants to discourage potential intruders by signaling that security measures are in place. By installing visible security cameras and posting warning signs around their premises, which type of control are they implementing?

  • Preventive Control

  • Detective Control

  • Deterrent Control

  • Corrective Control

Question 15 of 20

A company is about to enter into an agreement with a cloud service provider. Which of the following should the company primarily focus on to ensure timely and effective remediation of service interruptions?

  • Mean Time to Repair (MTTR)

  • Recovery Time Objective (RTO)

  • Reconnaissance

  • Annualized Loss Expectancy (ALE)

Question 16 of 20

A security analyst notices a series of requests on a company's web server logs. Each request tries to retrieve different paths that are not commonly accessed, and all the requests come from one external network address within a brief time window. Which of the following best describes the intent of these requests?

  • A misconfigured automatic task on the server

  • Execution of client-side scripts from a user's web browser

  • Reconnaissance by an attacker attempting to discover unlinked content or vulnerabilities

  • A user navigating the company's public website pages

Question 17 of 20

You are the IT manager overseeing a security assessment project. To ensure the third-party security firm's penetration test activities align with company policies and legal requirements, which document must be established to detail the testing boundaries, methods, timelines, and communication protocols?

  • Acceptable Use Policy (AUP)

  • Master Service Agreement (MSA)

  • Rules of Engagement (ROE)

  • Interconnection Security Agreement (ISA)

Question 18 of 20

What can an organization implement when a vulnerability cannot be patched immediately, to mitigate the risk while maintaining business functionality?

  • Encryption

  • Penetration testing

  • Compensating controls

  • Threat intelligence

Question 19 of 20

Which of the following scenarios best describes an attack that is likely to cause abnormal consumption of system resources, potentially leading to a system outage?

  • DDoS attack

  • Email spam campaign distributing unsolicited messages

  • Phishing attack that deceives a user into sharing their password

  • Social engineering attack that tricks an employee into wiring money

Question 20 of 20

In a move to 2FA, Crucial Technologies has begun to require employees to log in using their username and password and an additional password that is generated by an authenticator and is valid for only a limited period. This is what type of authentication technology?

  • SMS

  • Static codes

  • HOTP

  • TOTP