⚡️ Pass with Confidence Sale - 40% off ALL packages! ⚡️

2 days, 9 hours remaining!
00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

Which type of threat actor is MOST likely to engage in activities aiming to obtain sensitive information from an organization to demand payment in return for not releasing the information?

  • Nation-state

  • Organized crime

  • Hacktivist

  • Unskilled attacker

Question 2 of 20

Which type of digital certificate allows an organization to secure all subdomains of a domain with a single certificate?

  • Extended Validation certificate

  • Self-signed certificate

  • Wildcard certificate

  • Root certificate

Question 3 of 20

Which category of security controls involves managing day-to-day activities like incident response and change management?

  • Operational controls

  • Physical controls

  • Technical controls

  • Managerial controls

Question 4 of 20

Your organization is handling sensitive government contracts and must ensure that information related to these projects is guarded against unauthorized physical access. In accordance with data classification policies, which of the following is the BEST way to handle such data?

  • Institute policies for secure disposal of printouts and storage media containing the data

  • Encrypt all data and frequently change encryption keys

  • Store the data in a physically secure location and enforce strict access controls

  • Enable detailed logging of all access to the data for audit purposes

Question 5 of 20

During a quarterly audit, a company's technology oversight committee uncovers that certain staff members have been utilizing a third-party cloud storage service to share large project files, bypassing the established enterprise content management system due to its upload limitations. This third-party service was not evaluated or sanctioned by the company's technology governance policies. What does this scenario primarily illustrate?

  • Unauthorized access

  • Policy violation

  • Shadow IT

  • External cloud service compromise

Question 6 of 20

Your company has recently rolled out a new security awareness training program focused on recognizing social engineering attacks. To ensure the effectiveness of the training, what is the MOST effective method to evaluate employee understanding and application of the training content?

  • Conducting unannounced phishing simulation campaigns

  • Unannounced network scans after training completion

  • Including a quiz at the end of the training session

  • Publishing a quarterly newsletter highlighting social engineering threats

Question 7 of 20

Which Zero Trust concept continuously evaluates trust signals and adjusts a subject's permissions in real time, thereby shrinking the scope of potential threats?

  • Adaptive identity

  • Implicit trust zones

  • Policy Administrator

  • Policy-driven access control

Question 8 of 20

A data center's security policy requires that critical network services remain available to users even during equipment failures. To comply with this policy, the network engineer needs to configure a security appliance so that if it experiences a malfunction, legitimate network traffic is not interrupted, though it might reduce security temporarily. Which of the following failure modes should the engineer configure?

  • Fail-open

  • Fail-closed

  • Fail-safe

  • Fail-secure

Question 9 of 20

Your company has issued laptops to its employees for remote work. During a routine security audit, you identify that these laptops come with pre-installed software from the manufacturer that is not being used by the employees. What concerns should you have regarding this software from a security perspective?

  • This software can take up disk space, but it does not pose any security concerns.

  • The software could be useful for productivity, hence poses no significant risk.

  • This software may contain vulnerabilities that could be exploited by attackers because they often go unmanaged and unpatched.

  • The employees may use this software regularly, which could lead to potential data leaks.

Question 10 of 20

A security technician is decommissioning a hard drive that was used to store sensitive financial records. The technician performs a quick format on the drive before sending it to a recycling facility. Which of the following BEST describes the risk of this action?

  • The action complies with the 'Clear' standard of NIST 800-88 for media sanitization.

  • The data remains on the drive and can be retrieved using data recovery tools.

  • The quick format procedure sanitizes the drive by overwriting all data with zeros.

  • The drive's firmware is wiped, rendering the stored data permanently inaccessible.

Question 11 of 20

Industry studies of malicious insider incidents (such as the CERT Insider Threat Incident Corpus) reveal that some motivations occur far more often than ideological or philosophical beliefs. Which of the following motives accounts for a larger share of documented malicious insider cases than ideological or philosophical beliefs?

  • Political or philosophical ideology

  • Desire for recognition or notoriety

  • Ethical whistleblowing to expose wrongdoing

  • Revenge or personal grievance against the organization

Question 12 of 20

Crucial Technologies employs software to restrict employees from accessing certain websites or receiving certain types of emails. They are employing what type of control?

  • IDS

  • Content filter

  • IPS

  • DLP

Question 13 of 20

A technology firm headquartered in the United States with no previous international presence is strategizing for expansion into European and Asian markets. Which action is MOST critical for aligning the firm's security practices with external international requirements?

  • Conduct a thorough analysis of international data protection laws and adapt the company's data privacy framework for compliance with regulations such as GDPR.

  • Upgrade the encryption algorithms used across the company.

  • Implement a unified global security policy before assessing the legal considerations of each new market.

  • Expand the physical security measures at global data centers before considering variations in regional data privacy laws.

Question 14 of 20

Which authorization model grants or denies access to resources based on predefined roles assigned to users?

  • DBAC

  • DAC

  • MAC

  • RBAC

Question 15 of 20

A security analyst, reviewing alerts from an Endpoint Detection and Response (EDR) system, notices suspicious command-line activity on a user's workstation indicative of a malware infection. The analyst needs to contain the threat while preserving evidence for a forensic investigation. What is the BEST immediate action for the analyst to take?

  • Immediately power off the workstation to stop the malware's execution.

  • Run a full antivirus scan on the workstation while it remains connected to the network.

  • Isolate the workstation from the network but leave it powered on.

  • Disconnect the workstation from the network and immediately re-image it from a known-good backup.

Question 16 of 20

What technique should be used to restrict dedicated administrative access to only the necessary times when it is needed, thereby reducing the exposure time of elevated privileges?

  • Multifactor authentication

  • Password vaulting

  • Security group assignments

  • Just-in-time permissions

Question 17 of 20

During an incident response exercise, a security analyst needs to follow a set of predetermined, task-level instructions for handling a specific type of malware outbreak. The instructions detail the exact steps for detection, containment, and eradication. What is this type of document called?

  • Information Security Policy

  • Risk Analysis Documentation

  • Change Management Policy

  • Playbook

Question 18 of 20

An organization is preparing a compliance report that will be submitted to both internal stakeholders and an independent regulatory body. Which of the following would be the BEST approach to ensure that the report satisfies the requirements of both parties?

  • Include evidence of alignment with regulatory compliance standards and internal policies and procedures.

  • Focus solely on external compliance mandates without detailing the internal governance mechanisms.

  • Summarize only the internal auditing procedures followed during the reporting period.

  • Limit the report to internal risk assessment findings without addressing regulatory compliance standards.

Question 19 of 20

What is a primary method for enhancing the security of a network switch?

  • Changing the management VLAN to a non-default value

  • Enabling DHCP on the switch

  • Disabling unused ports

  • Configuring multiple VLANs

Question 20 of 20

What type of security device deployment allows network traffic to flow through it, potentially blocking or modifying packets if malicious activity is detected?

  • Passive sensor

  • Monitoring device

  • Tap device

  • Inline device