00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

A data center's security policy requires that critical network services remain available to users even during equipment failures. To comply with this policy, the network engineer needs to configure a security appliance so that if it experiences a malfunction, legitimate network traffic is not interrupted, though it might reduce security temporarily. Which of the following failure modes should the engineer configure?

  • Fail-secure

  • Fail-safe

  • Fail-closed

  • Fail-open

Question 2 of 15

Within the AAA (Authentication, Authorization, and Accounting) framework, which component is specifically responsible for tracking user activities-such as logon time, commands executed, and data transferred-and generating audit records that hold users accountable for their actions?

  • Authorization

  • Authentication

  • Auditing

  • Accounting

Question 3 of 15

A security analyst is reviewing the design of an embedded system. The system is designed to periodically download firmware updates from a public HTTP server and install them. The analyst notes that the update process does not validate a digital signature for the new firmware file before installation. Which of the following vulnerabilities is the MOST significant security risk in this design?

  • Time-of-check to time-of-use (TOCTOU)

  • VM escape

  • Directory traversal

  • Malicious update

Question 4 of 15

A company's IT department is implementing a new web application that will store sensitive customer information. As part of the design, they need to ensure appropriate user access to data within the application. Which of the following methods is MOST effective in restricting access to the data based on a user's role within the company?

  • Requiring username and password authentication for application logins

  • Using MAC to assign classification labels to data

  • Allowing DAC where users control access to their data

  • RBAC

Question 5 of 15

A member of the IT department received a call from an individual claiming to be from the telecommunications company that provides services to the organization. The caller requested the IT staff member to confirm sensitive configuration details about the company's PBX system to help resolve an alleged network issue. Which of the following is the BEST course of action for the IT staff member to take?

  • Verify the caller's identity by calling back on a known, official number of the telecommunications company before providing any information

  • Place the caller on a brief hold to inform a supervisor about the request and then return to share the information

  • Tell the caller to send an official request for information through email and then proceed with the call

  • Share the requested information to resolve the network issue promptly as the caller seems knowledgeable about the company's telecommunications setup

Question 6 of 15

A financial services company notices that their online banking platform becomes unresponsive during certain peak hours despite having no unusual activity from legitimate users. The IT team suspects a network-based attack designed to overwhelm their servers. Which type of attack are they most likely experiencing?

  • Credential Replay

  • Wireless Eavesdropping

  • DNS Spoofing

  • DDoS

Question 7 of 15

What best describes a site that typically has infrastructure in place but lacks active systems and data, and requires a longer time to become operational after a disaster?

  • A backup location with no infrastructure in place, requiring complete setup from scratch

  • A backup location with infrastructure but without active systems requiring extended time to activate

  • A backup location that is partially operational with some systems and processes

  • A fully operational and synchronized replica of the primary site with real-time data replication

Question 8 of 15

During a post-incident review meeting, a security analyst is tasked with improving the incident response process based on recent events. Which of the following actions would BEST ensure a positive impact on future incident response capabilities?

  • Conducting a review of historical incident trends without making changes to existing procedures.

  • Deciding that the existing Incident Response Plan is sufficient since the incident was eventually contained.

  • Revising all security training materials without assessing their relevance to the incident.

  • Updating the Incident Response Plan with specific improvements identified from the incident.

Question 9 of 15

You are selecting a biometrics system for your company. You want to make sure you select a system that is going to be the most accurate choice. What calculation would you use to compare the different systems?

  • Efficacy rates

  • FRR

  • CER

  • FAR

Question 10 of 15

Which system is implemented to safeguard sensitive information from being leaked outside of the corporate network?

  • Data Loss Prevention (DLP) system

  • Firewall

  • Antivirus software

  • Intrusion Prevention System (IPS)

Question 11 of 15

What is the primary purpose of security groups in cloud computing?

  • They define rules for controlling network traffic to and from resources within a cloud environment.

  • They are used to group user accounts into a single administrative unit for assigning permissions across multiple resources.

  • They specify the encryption algorithms that must be used for data at rest in the cloud storage services.

  • They determine the geographical regions where the cloud provider is authorized to store data.

Question 12 of 15

A web hosting company is expanding its services to support high-traffic websites. The company needs to ensure that the resources are evenly distributed across servers to manage dynamic loads effectively. Which solution should the company primarily consider implementing to address this requirement?

  • Set up a server cluster that treats multiple servers as a single system for failover redundancy.

  • Adopt a serverless computing model to eliminate the need to manage server resources entirely.

  • Implement a load balancer to manage the distribution of the network traffic across the servers.

  • Utilize containerization to encapsulate the web applications on a single server.

Question 13 of 15

When establishing a Business Partners Agreement with a new vendor, what element is most crucial to ensure the protection of sensitive data?

  • Specific definitions of the parties involved

  • Terms of conflict resolution processes

  • Clearly defined security requirements

  • Regularly scheduled review cycles

Question 14 of 15

Which system is responsible for examining network traffic to identify undesirable activity and can actively intervene to prevent or block such activities?

  • A system that reinforces network architecture by enhancing data packet routing efficiency.

  • A system that optimizes web traffic by caching frequently accessed resources for better performance.

  • A system dedicated to monitoring for compliance with data governance and regulatory standards.

  • A system that actively engages to interrupt or block potential security threats detected in network traffic.

Question 15 of 15

What can an organization implement when a vulnerability cannot be patched immediately, to mitigate the risk while maintaining business functionality?

  • Encryption

  • Threat intelligence

  • Compensating controls

  • Penetration testing