00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

A security administrator is verifying a new software update from a trusted vendor. The administrator confirms that the update is digitally signed with the vendor's valid code-signing certificate. Why might this update still pose a security risk to the organization?

  • A valid digital signature automatically bypasses all antivirus and endpoint protection scanning.

  • The vendor's build environment could have been compromised, allowing malicious code to be signed with a legitimate certificate.

  • Code-signing certificates cannot be revoked by the Certificate Authority (CA) once issued.

  • Digital signatures only provide confidentiality for the update package through encryption.

Question 2 of 20

A company is drafting its initial set of IT security documents. Among them, there is a need to establish a document that offers general advice and recommended practices for users to follow when dealing with company IT resources. Which type of security document should the company develop to fulfill this requirement?

  • Standards

  • Procedures

  • Policies

  • Guidelines

Question 3 of 20

As a security architect, you are evaluating the implementation of network appliances that should be primarily utilized for the identification of malfeasance occurring within the internal company network. In this scenario, which of the following solutions strategically placed within the network would best suit the continuous observation and timely reporting of anomalous activities without actively interfering with data flow?

  • IDS

  • Unified Threat Management

  • IPS

  • Jump Server

Question 4 of 20

This email protocol provides a mechanism for senders and receivers to determine whether a message is legitimately from the claimed domain and what action to take if it is not. The protocol builds on the results of Sender Policy Framework and DomainKeys Identified Mail checks.

  • DomainKeys Identified Mail (DKIM)

  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

  • Sender Policy Framework (SPF)

  • Brand Indicators for Message Identification (BIMI)

Question 5 of 20

Users within a company are experiencing intermittent inability to access critical file-sharing services, while internet connectivity is unaffected. The IT department notes unusually high network traffic directed at the servers during these outages. What is the MOST likely cause behind the file-sharing service being inaccessible?

  • An ARP spoofing attack causing content redirection.

  • Switching infrastructure failure leading to intermittent network partitioning.

  • A DDoS attack on the company's file-sharing servers.

  • A misconfigured ACL blocking access to the file-sharing service.

Question 6 of 20

A security administrator at a mid-size company is selecting an algorithm for secure email encryption that relies on a public/private key pair rather than a shared secret, to implement digital signatures as well. Which of the following algorithms satisfies this requirement?

  • AES

  • RC4

  • RSA

  • Blowfish

Question 7 of 20

Which of the following scenarios would most likely warrant an investigation into potential account compromise due to indications of 'Concurrent session usage'?

  • A user logs into a VPN from their home network and then logs into a web application using the same credentials from the same network

  • A user's corporate email account is accessed simultaneously from a workstation in the company's New York office and a mobile device in Paris

  • After changing passwords, a user experiences a series of re-authentication prompts on their previously authenticated devices

  • A user logs into their email from a new device in their home country a day after logging in from their office computer

Question 8 of 20

Your company is engaging with a vendor to implement a new customer relationship management system. To protect your proprietary data and client information during discussions, what should be signed prior to sharing detailed system specifications and data flows?

  • Memorandum of Understanding (MOU)

  • Master Service Agreement (MSA)

  • Non-Disclosure Agreement (NDA)

  • Service-Level Agreement (SLA)

Question 9 of 20

What type of risk assessment is conducted as needed, often in response to specific events or changes in the environment?

  • Qualitative

  • Ad Hoc

  • Recurring

  • Continuous

Question 10 of 20

After applying a security patch, an administrator notes that the patching process completed without any reported errors. What is the BEST next step to verify that the underlying vulnerability has actually been eliminated?

  • Initiate a targeted rescan of the system with the organization's vulnerability scanner to confirm remediation.

  • Rely on the patch management tool's success log and close the ticket without additional action.

  • Wait until the next scheduled quarterly enterprise-wide scan to see if the vulnerability reappears.

  • Monitor SIEM alerts for seven days; if no new alerts are generated, assume the vulnerability is resolved.

Question 11 of 20

Which of the following BEST describes a decentralized security governance structure?

  • Decisions are made exclusively at the executive level.

  • All security decisions are outsourced to a third-party vendor.

  • Lower-level departments have decision-making authority.

  • A single, rigid security policy is enforced across all departments.

Question 12 of 20

Your coworker is out sick due to an illness. In his absence you have received the results of a vulnerability scan he ordered from an external provider. Unfortunately your coworker did not give you any information on what type of scan was conducted or what methods were used. The results show that 3 injection vulnerabilities were identified but are only possible when attempted from an authenticated user account. Based on the information you have, what type of vulnerability scan was most likely completed?

  • Gray box

  • Credentialed

  • Intrusive

  • Non-intrusive

Question 13 of 20

A company's network was infiltrated by an attacker who used sophisticated techniques to bypass advanced security measures. The attacker was well-funded and had advanced capabilities. Sensitive data was exfiltrated over an extended period without detection. Which type of threat actor is most likely responsible for this attack?

  • Unskilled Attacker

  • Insider Threat

  • Nation-State Actor

  • Hacktivist

Question 14 of 20

What does the term 'resource provisioning' refer to in the context of securing computing resources?

  • The act of installing antivirus software on workstations and servers

  • The process of allocating and managing computing resources to users or systems according to security policies

  • The step-by-step methodology of responding to security incidents

  • The storage and classification of organizational data in accordance with established compliance requirements

Question 15 of 20

Which of the following statements best describes the relationship between managerial controls and technical controls?

  • Managerial controls replace the need for technical controls

  • Managerial controls are solely responsible for preventing security incidents

  • Managerial controls provide the framework for implementing technical controls

  • Managerial controls are a subset of technical controls

Question 16 of 20

A company needs to systematically manage updates and modifications to its IT systems to prevent unintended consequences during regular operations. Which operational control MOST effectively addresses this need?

  • Change management

  • Intrusion detection

  • Encryption protocols

  • Security awareness training

Question 17 of 20

A company has multiple online services with different compute requirements, ranging from high-intensity processing for video rendering to low-intensity processes for a document storage system. The CTO wants to ensure that these services remain operational with minimal disruption in the event of a hardware failure. Which of the following solutions would BEST address the compute resilience needs for the company's diverse set of services?

  • Single powerful server with a hot spare

  • Clustered servers with resource balancing

  • Multiple air-gapped systems for each service

  • Decentralized servers without load balancing

Question 18 of 20

Which of the following best describes why an organization must be aware of local and regional regulations when developing their security program?

  • To ensure compliance with specific legal requirements that may not be covered by national or global standards.

  • To avoid the need for customizing security measures for different company branches.

  • To apply universal standards of cybersecurity that are recognized globally.

  • To simplify the security program management by adhering to broader compliance laws.

Question 19 of 20

Under a Choose Your Own Device (CYOD) mobile deployment model, employees are permitted to connect any personal device they prefer to the corporate network, without having to select from a company-approved list of devices.

  • False

  • True

Question 20 of 20

When deploying a new fleet of servers, what is the BEST initial step to ensure that they adhere to the company's security policy?

  • Conduct a security awareness training for IT staff before server deployment

  • Scan the servers with a vulnerability scanner immediately after deployment

  • Use industry best practices as a guide for system configuration

  • Create and implement a documented security configuration baseline