00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

A corporation wants to upgrade their security capabilities by deploying a solution that can not only detect threats on individual devices but also aggregate and analyze security data from across the entire IT environment, including network and cloud sources. What is the most comprehensive option that this corporation should consider for enhanced threat detection and system-wide incident response?

  • User and Entity Behavior Analytics (UEBA)

  • Extended Detection and Response (XDR)

  • Endpoint Detection and Response (EDR)

  • Intrusion Prevention System (IPS)

Question 2 of 15

When configuring a security device to ensure that, in the event of a failure, it will maintain a state that prevents traffic from passing through it, which mode should be used?

  • Fail-open

  • Fail-safe

  • Fail-closed

  • Fail-secure

Question 3 of 15

When implementing changes to a system, which component ensures that if the change fails, the system can be restored to its previous state?

  • Impact Analysis

  • Maintenance Window

  • Backout Plan

  • Change Approval

Question 4 of 15

A company has observed that employees are frequently accessing social media sites during work hours, leading to decreased productivity. The IT department decides to update the company's guidelines to address this issue. Which element of the security governance framework should they revise to regulate acceptable internet usage by employees?

  • Access Control Standards

  • Information Security Policy

  • Acceptable Use Policy (AUP)

  • Incident Response Procedures

Question 5 of 15

A financial institution is updating its information security program. Who should be designated as the risk owner for financial data breaches?

  • The Data Owner

  • The Security Analyst

  • The Chief Information Officer (CIO)

  • The IT Support Staff

Question 6 of 15

A data-center operations manager is performing a business impact analysis and needs to estimate how long a critical database cluster typically remains functional before an unexpected hardware fault requires repair. The vendor specification lists an MTBF of 75,000 hours for each node. In this context, what does MTBF stand for, and what reliability information does it provide?

  • Mean Time Between Failures, measuring the average time operational between system breakdowns

  • Minimum Time Before Failure, reflecting the shortest time a system might operate before encountering an issue

  • Mean Time Before Fix, representing the average time to repair a system after a failure

  • Maximum Time Before Failure, indicating the longest time a system can function before it fails

Question 7 of 15

You have been called to the office of the CEO for a confidential meeting. In the meeting the CEO informs you he 'has a virus that won't let him login without paying a fee.' You begin to investigate the issue and find that the CEO downloaded a file from a website a friend shared on a social media site. After downloading the file his computer restarted and now will not allow anyone to login unless they enter credit card information. Which option best describes the attack used in this scenario based on the information available?

  • The CEO was the target of a spear phishing social engineering attack

  • The CEO downloaded and executed Ransomware

  • A botnet is attacking the CEO's computer and disabling login attempts

  • The CEO executed a Rootkit which gave backdoor access to a hacker

Question 8 of 15

Which of the following terms describes an attacker trying to steal personal or sensitive information using a VoIP system?

  • VoIP takeover

  • Wishing

  • Phishing

  • Vishing

Question 9 of 15

Which tool helps manage and secure privileged accounts by allowing for the temporary issuing of administrative rights and automatically revoking them after a set time period or task completion?

  • Just-in-time permissions

  • Password vaulting

  • Password managers

  • Ephemeral credentials

Question 10 of 15

What term best describes an attack that overburdens network systems with an overwhelming amount of traffic, leading to reduced availability or performance for legitimate service requests?

  • Resource exhaustion

  • Cross-site forgery

  • Code injection

  • Credential harvesting

Question 11 of 15

An IT security manager wants to ensure that users can employ complex and unique passwords for each of their accounts without the need to remember each one individually. Which of the following solutions would best meet this requirement?

  • Implementing a password manager application

  • Enforcing strict password complexity and expiration policies

  • Implementing biometric authentication methods

  • Deploying single sign-on authentication for all services

Question 12 of 15

A regional healthcare organization regularly faces threats from severe weather events and has tasked the IT department with enhancing their business continuity plan. Leadership's primary goal is to ensure continuous operation of essential systems with no perceptible downtime in the event of a weather disaster. What update to the business continuity plan would BEST reflect leadership's priority for maintaining uninterrupted essential services?

  • Outline strict targets for the time to restore essential services and schedules for critical data backups

  • Build and maintain a facility that is prepared and available on-demand for immediate operational takeover of essential systems

  • Assemble a control center dedicated to managing communication and coordination during emergency responses

  • Enhance network infrastructure to manage a higher volume of data traffic during emergency situations

Question 13 of 15

Your organization is exploring the option of migrating some services to the cloud while maintaining critical systems onsite due to their sensitive nature. As the IT Security Specialist, you've been asked to assess the security considerations for the on-premises systems. Which of the following is a primary security advantage of retaining critical systems on-premises?

  • Lower initial capital expenditure compared to cloud solutions

  • Reduced physical access risk to systems

  • Increased scalability of critical systems

  • Complete control over physical and logical security measures

Question 14 of 15

A company is implementing a security training program for its employees and wants to ensure they are able to identify and appropriately respond to potential security events as they occur. What is the BEST method to enhance their situational awareness?

  • Conducting real-world scenario-based training exercises

  • Providing a document with examples of phishing attempts to all employees

  • Implementing an automated alert system for potential security events

  • Holding routine security meetings to discuss potential threats

Question 15 of 15

An organization plans to outsource its IT management to a managed service provider (MSP). Which of the following is the most significant security consideration associated with this strategy?

  • The organization's attack surface will be expanded to include the MSP's environment.

  • The use of an MSP eliminates the need for internal security monitoring.

  • The organization can transfer all security liability to the MSP through the service-level agreement (SLA).

  • The primary purpose for using an MSP is to reduce the capital expenditure on security tools.