⚡️ Pass with Confidence Sale - 40% off ALL packages! ⚡️

1 day, 9 hours remaining!
00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

Which physical threat involves natural disasters impacting organizational assets?

  • Environmental threat

  • Brute force attack

  • RFID cloning

  • Logic bomb

Question 2 of 20

A company is hardening the connection between its public e-commerce website and the browsers of customers worldwide. The security team wants to ensure that any data exchanged is unreadable if intercepted, that the server's identity can be validated by the client, and that any unauthorized modification of packets is detected immediately. Which protocol BEST satisfies these goals?

  • Internet Protocol Security (IPsec)

  • Secure Shell (SSH)

  • Privacy Enhanced Mail (PEM) files

  • Transport Layer Security (TLS)

Question 3 of 20

A digital forensics investigator is collecting evidence from a compromised workstation. Which action best maintains the chain of custody?

  • Use write-blocking devices to prevent data alteration.

  • Encrypt the evidence to protect it from unauthorized access.

  • Analyze the evidence on the original workstation to maintain context.

  • Record the date, time, and individuals who handle the evidence.

Question 4 of 20

A security analyst is investigating an incident where multiple users reported that when they tried to access their company's legitimate cloud-based storage portal, they were redirected to a fraudulent website that prompted them for their credentials. The users confirmed they had typed the correct URL into their browsers. Which of the following attacks MOST likely occurred?

  • Credential replay

  • Distributed denial-of-service (DDoS)

  • On-path attack

  • DNS cache poisoning

Question 5 of 20

You are a super 1337 hacker who just discovered a vulnerability in an operating system. You do some research and find nothing online regarding this exploit and believe you are the first to find it. What option would be the correct classification of this vulnerability?

  • Zero day

  • North/South

  • East/West

  • Spoof

  • Brute force

  • Denial of Service

Question 6 of 20

You receive a robocall from a number that appears to be your bank. During the call you are told that there was suspicious activity on your account and to remain on the line to talk to an agent. An individual then got on the line and asked you questions that would allow someone to compromise your account. This is an example of which type of specific social engineering?

  • Smishing

  • Watering hole

  • Pretexting

  • Vishing

Question 7 of 20

Which of the following is an example of a technical control used to protect network resources?

  • Security awareness training

  • Access controls

  • Encryption

  • Firewall

Question 8 of 20

A security consultant is helping an organization to enhance the detection capabilities of unauthorized activities within its internal network. The organization's security strategy includes the deployment of Network Intrusion Detection Systems (NIDS) but also emphasizes minimizing the impact on network performance. Which deployment strategy should the consultant recommend?

  • Deploy NIDS sensors in inline mode to actively moderate and filter traffic.

  • Set up NIDS sensors to operate in stealth mode, invisible to network hosts and devices.

  • Place NIDS sensors in promiscuous mode to passively collect traffic without duplicating it.

  • Configure NIDS sensors in tap/monitor mode to replicate the network traffic non-intrusively.

Question 9 of 20

Which type of penetration test involves combining both offensive and defensive techniques to thoroughly assess an organization's security posture?

  • Defensive Penetration Testing

  • Integrated Penetration Testing

  • Physical Penetration Testing

  • Offensive Penetration Testing

Question 10 of 20

A company's publicly accessible blog has been defaced with political slogans and messages. These unauthorized alterations have not resulted in any financial demand, data theft, or additional malfunctions within the company's IT infrastructure. Which type of threat actor is MOST likely to be responsible for this incident?

  • Unskilled attacker

  • Insider threat

  • Organized crime

  • Hacktivist

Question 11 of 20

What does the term 'impossible travel' signify in the context of security monitoring?

  • A method by which session hijacking attacks are performed on multiple accounts at once

  • A warning sign that a user account is accessed from two distant places in a period too short for regular travel, hinting at credential misuse

  • A security measure taken after multiple unsuccessful login attempts from different locations

  • A type of race condition vulnerability exploited during security checks

Question 12 of 20

An organization wants to identify the differences between its current security capabilities and the desired future state to improve its overall security posture. Which process should the organization undertake to achieve this goal?

  • Execute penetration testing

  • Undertake a gap analysis

  • Conduct a vulnerability scan

  • Perform a risk assessment

Question 13 of 20

Which of the following options is an attack type or vulnerability that could expose a database's confidential information?

  • SQL injection

  • Cross Site Scripting (XSS)

  • Database Snapshot Attack (DSA)

  • Port Probing

  • SSL Privilege Escalation

  • HTTP Web Scraping

Question 14 of 20

Which of the following actions best contributes to securing a server by adhering to the principle of disabling ports/protocols?

  • Keeping all ports open to ensure full functionality.

  • Implementing complex passwords for all user accounts.

  • Changing port numbers for common services to non-standard values.

  • Closing ports that are not in use by network services.

Question 15 of 20

A company's primary security measure for their sensitive server room is a biometric access control system. Due to a recent natural disaster, the biometric system is temporarily unavailable. Which of the following would be the BEST compensating control to implement immediately to ensure that only authorized personnel can access the server room while maintaining a similar level of security?

  • Replace the biometric system with a standard key lock.

  • Set up a temporary key code lock on the server room door.

  • Implement a sign-in/out log that is monitored by a security guard.

  • Disable access to the server room until the system is repaired.

  • CCTV

Question 16 of 20

A security analyst is tasked with implementing a solution to receive timely data on emerging malware, malicious IP addresses, and known vulnerabilities. Which of the following would BEST fulfill this requirement?

  • A vulnerability scanner

  • A security baseline

  • A Security Information and Event Management (SIEM) system

  • A threat feed

Question 17 of 20

A healthcare company relies on a virtualized server environment to store sensitive patient records. The IT security specialist is implementing a backup strategy that allows for quick restoration of data with minimal data loss in case of a server crash. Which of the following would be MOST effective for this purpose?

  • Performing a full backup of the servers on a weekly basis

  • Setting up differential backups every 48 hours

  • Using scheduled snapshots of the virtual machines

  • Configuring incremental backups to be taken daily

Question 18 of 20

Considering your current network security setup only provides notifications when potential security breaches occur, which enhancement would allow the system to not just detect but also proactively counteract malicious traffic?

  • Implement a system with automatic threat mitigation capabilities

  • Bolster the organization's data loss prevention (DLP) strategies

  • Enhance the cryptographic assurance using public key infrastructure (PKI)

  • Incorporate additional security information and event management (SIEM) features

Question 19 of 20

During a routine security audit, the administrator discovers that two different archived log files produce the exact same SHA-1 hash value, even though their contents differ. Which type of cryptographic attack does this finding most likely indicate?

  • Replay attack

  • Birthday attack

  • Downgrade attack

  • Collision attack

Question 20 of 20

Your organization wants to test its cybersecurity defenses. A penetration test is conducted without making those responsible for defense aware of the test. This type of test is done by which of type of team?

  • Purple

  • White

  • Red

  • Blue