00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

An organization is expanding its onsite data center infrastructure to accommodate a recent growth in remote workforce. They are concerned with the creation of a secure network architecture. In this scenario, which of the following would be the BEST solution to ensure secure remote access while minimizing the attack surface?

  • Deploy an intrusion detection system at the network perimeter.

  • Install a virtual private network (VPN) for secure remote connections.

  • Use a jump server as the sole access point for network management.

  • Configure a proxy server to control and filter outbound internet traffic.

Question 2 of 15

What is the primary goal of conducting a tabletop exercise as part of cybersecurity testing?

  • To conduct an automated penetration test against the organization's IT infrastructure.

  • To physically test the security measures in place by attempting to gain unauthorized access to a facility.

  • To facilitate a scenario-driven discussion that tests an organization's incident response plan.

  • To perform a live-action simulation of a cyberattack on the organization's network.

Question 3 of 15

A security analyst notices a series of requests on a company's web server logs. Each request tries to retrieve different paths that are not commonly accessed, and all the requests come from one external network address within a brief time window. Which of the following best describes the intent of these requests?

  • A misconfigured automatic task on the server

  • A user navigating the company's public website pages

  • Execution of client-side scripts from a user's web browser

  • Reconnaissance by an attacker attempting to discover unlinked content or vulnerabilities

Question 4 of 15

A company's IT department is implementing a new web application that will store sensitive customer information. As part of the design, they need to ensure appropriate user access to data within the application. Which of the following methods is MOST effective in restricting access to the data based on a user's role within the company?

  • Using MAC to assign classification labels to data

  • Requiring username and password authentication for application logins

  • RBAC

  • Allowing DAC where users control access to their data

Question 5 of 15

A company wants to minimize the exposure of sensitive customer credit card data within its e-commerce environment. Which of the following data protection strategies would BEST reduce the risk of credit card data breaches while maintaining the ability to perform transactional operations?

  • Geolocation

  • Masking

  • Encryption

  • Tokenization

Question 6 of 15

A company is migrating its database containing sensitive customer information to a public cloud using an Infrastructure as a Service (IaaS) model. According to the typical cloud shared responsibility model, which party is primarily responsible for ensuring the sensitive data within the database is encrypted?

  • The customer is responsible for configuring encryption for their data.

  • The responsibility is equally shared, with both parties co-managing the encryption keys.

  • The cloud provider is responsible for encrypting all customer data by default.

  • A third-party auditor is responsible for implementing encryption controls.

Question 7 of 15

What is the primary role of monitoring in relation to indicators within a security infrastructure?

  • Conducting retrospective analysis to determine the root cause of a security incident

  • Remediating vulnerabilities to prevent the exploitation of a system

  • Identifying unusual patterns or behavior that may signify a security incident

  • Enforcing policy by shutting down systems that do not adhere to predefined configurations

Question 8 of 15

According to industry guidance such as NIST SP 800-88, which high-level action should an organization take to ensure that data on any storage device (including HDDs and SSDs) is rendered unrecoverable before the device is disposed of or leaves organizational control?

  • Delete all visible files and empty the recycle bin

  • Disable the storage controller in the system BIOS

  • Sanitize the media before disposal

  • Run a quick format on the device

Question 9 of 15

An organization has decided to implement an application allow list policy to reduce the risk of malware infections on its network. Which of the following best describes the action the organization is taking?

  • Compiling a list of software that users believe should not be installed on their systems.

  • Creating a list of authorized software that is allowed to run on company systems.

  • Allowing users to decide which software can be executed on their individual workstations.

  • Permitting all installed software to run but monitoring their behaviors for any suspicious activity.

Question 10 of 15

A cybercriminal gains access to sensitive internal documents revealing a company's illegal activities and threatens to release them unless the company complies with their demands. What is the attacker's primary motivation in this scenario?

  • Revenge

  • Espionage

  • Blackmail

  • Sabotage

Question 11 of 15

A company's security team has recently upgraded the network firewall to a newer model to enhance security features. As a security analyst, what is the MOST important action to perform following the upgrade to ensure ongoing operational efficiency?

  • Schedule a meeting with the stakeholders to discuss the possibility of future upgrades.

  • Implement additional firewall rules to immediately increase the security posture without a scheduled review.

  • Update the security policies and network configuration documentation to reflect changes made by the new firewall.

  • Perform a complete network penetration test to identify potential new vulnerabilities introduced.

Question 12 of 15

Which of the following is used to guide the secure setup of systems and applications by providing a collection of security configuration settings?

  • Automated reports

  • Vulnerability scans

  • Security groups

  • Benchmarks

Question 13 of 15

To enhance incident detection, a company is configuring their monitoring system to manage the alarm process effectively. Which of the following options is the MOST effective method for ensuring that critical alarms are received and addressed immediately by the appropriate personnel?

  • Adjust the threshold for notification to reduce the volume of alarms triggered.

  • Implement an automated ticketing system where alarms trigger the creation of investigation tickets.

  • Send alarm notifications to mobile devices or a messaging app used by the cybersecurity team.

  • Instruct the team to conduct daily audit log reviews for security-related events.

Question 14 of 15

A security analyst is tasked with enhancing the organization's proactive defense capabilities by identifying new and evolving attack methodologies before they are widely used. Which of the following would be the MOST effective practice for this purpose?

  • Conduct regular internal vulnerability scans on all network assets.

  • Perform a comprehensive penetration test on an annual basis.

  • Subscribe to and analyze threat intelligence feeds.

  • Enforce a more stringent password complexity and rotation policy.

Question 15 of 15

A financial services company wants to ensure that its security controls are effectively protecting its network and critical data assets. The company is mandated by regulatory requirements to conduct periodic reviews of its security infrastructure. Which of the following would BEST satisfy the need for an unbiased evaluation of the operational security?

  • Scheduling regular penetration testing by the in-house cybersecurity team.

  • Contracting an independent third-party to perform a comprehensive audit of security controls.

  • Continuous monitoring by an internal audit committee.

  • Conducting a thorough self-assessment using internal security and audit teams.