00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

A security analyst is reviewing a report from a recent vulnerability scan that identified over 200 issues across various systems, including web servers, databases, and network switches. To manage the remediation process effectively, the analyst groups the vulnerabilities based on common characteristics, such as the type of weakness (e.g., SQL injection, cross-site scripting) and the affected technology stack. What is this process of categorizing vulnerabilities called?

  • Vulnerability indexing

  • Vulnerability classification

  • Vulnerability scoring

  • Vulnerability enumeration

Question 2 of 20

What is the primary role of monitoring in relation to indicators within a security infrastructure?

  • Enforcing policy by shutting down systems that do not adhere to predefined configurations

  • Remediating vulnerabilities to prevent the exploitation of a system

  • Identifying unusual patterns or behavior that may signify a security incident

  • Conducting retrospective analysis to determine the root cause of a security incident

Question 3 of 20

In the event of a planned software upgrade impacting the critical infrastructure of a financial institution's transaction system, which of these actions is MOST crucial to ensure the upgrade can be rolled back without affecting the normal operational capability and security of the system?

  • Maintain strict version control during the upgrade process.

  • Update all operational documentation prior to the upgrade.

  • Ensure effective communication with stakeholders about the upgrade.

  • Establish a detailed backout plan in case the upgrade fails.

Question 4 of 20

A systems administrator is implementing a new authentication policy that requires users to provide their password and a six-digit code from a hardware token. Which of the following security concepts does this scenario BEST describe?

  • Biometric authentication

  • Multifactor authentication

  • Authorization

  • Single sign-on

Question 5 of 20

A company is assessing various options to enhance the security of their facility and data center. Which of the following would serve as the best deterrent control to discourage trespassers from entering the secured premises of the data center?

  • Installing highly visible security cameras around the perimeter and entry points

  • Deploying mantraps at the primary entrance to the data center

  • Implementing badge readers at all points of entrance and exit

  • Erecting security awareness posters regarding tailgating in employee areas

Question 6 of 20

Which authentication protocol uses a ticket-granting service as part of its mechanism to provide access to resources across a network?

  • Direct Access

  • Simple Sign-On

  • Kerberos

  • Network Access Token

Question 7 of 20

A company is deploying a new critical web application that must ensure continuous operation even in the event of a single system failure. Which of the following strategies should the company employ to best align with high availability considerations for this application?

  • Implement load balancing across multiple servers

  • Take frequent snapshots of the application's data

  • Increase the memory capacity on the primary server

  • Configure a failover cluster for the application servers

Question 8 of 20

A network administrator wants to implement an intrusion detection system that can monitor network traffic without impacting network performance or flow. Which of the following device attributes would be most suitable for this requirement?

  • Inline active device

  • Tap active device

  • Tap passive device

  • Inline passive device

Question 9 of 20

To comply with a new security policy, an organization must guarantee that only explicitly approved software can execute on its high-value database servers. The security team configures the host operating systems so that every process is blocked by default unless the executable appears on a predefined list of trusted applications. Which type of control does this configuration implement?

  • Discretionary access control (DAC)

  • Role-based access control (RBAC)

  • Allow list (application allowlisting)

  • Deny list (application denylisting)

Question 10 of 20

A systems administrator observes that every Friday afternoon, right after the stock market closes, a series of unauthorized transactions and excessive resource utilization occurs on a finance company's trading application server. What type of malware is most likely responsible for this recurring incident?

  • Trojan

  • Spyware

  • Worm

  • Logic bomb

Question 11 of 20

A security administrator has deployed vendor patches to a group of web servers after a critical vulnerability was discovered. According to the vulnerability-management process, which of the following activities should be performed next to confirm that the servers are no longer susceptible to the original flaw?

  • Document an exception for systems that could not be patched.

  • Perform a vulnerability rescan of the patched servers.

  • Assign new Common Vulnerability Enumeration (CVE) identifiers.

  • Calculate the exposure factor to determine business impact.

Question 12 of 20

Which of the following actions provides logical (software-defined) segmentation rather than physical segmentation within an enterprise network?

  • Installing an air-gapped workstation that has no network interface card.

  • Configuring separate VLANs and matching IP subnets on existing switch ports to keep voice and data traffic isolated.

  • Running a point-to-point dark-fiber link between two database servers to separate their traffic from the LAN.

  • Deploying dedicated cabling and standalone switches to isolate the payroll network.

Question 13 of 20

Which of the following best describes the process of ensuring that each information asset receives a label to indicate its value, owners, and level of sensitivity within an organization?

  • Ownership

  • Classification

  • Monitoring

  • Enumeration

Question 14 of 20

Before beginning a penetration test, a document must be established to outline the boundaries and methods of the test. Which document is specifically designed for this purpose?

  • A detailed document specifying tasks to be completed under a contract, often as part of a larger agreement

  • A document that specifies the actions, scope, methods, and protocols to be adhered to during a penetration test

  • A document that outlines the delivered services, their standards, and the legal framework for ongoing relationships

  • A document that formalizes the mutual understanding and general intent of the collaborating parties

Question 15 of 20

Which of the following statements BEST explains why a network firewall alone cannot provide the same level of protection as encryption for data stored on a network file server?

  • Encryption secures data moving across the network, whereas a firewall secures all data that resides on the server's drives.

  • Neither firewalls nor encryption protect data at rest; only physical security controls such as locks and guards can do so.

  • A firewall enforces access rules for network traffic, but only encryption renders the stored data unreadable to unauthorized users, so both controls are required to protect data at rest.

  • A properly configured firewall automatically encrypts any files transmitted or stored behind it, eliminating the need for separate data-at-rest encryption.

Question 16 of 20

Your employer has always been very security conscious and to date does not use any company owned mobile or wireless devices like laptops and smart phones. A new project aims to evaluate options on the market for security implementing laptops within the company. One requirement is that all data stored on the laptop's drive must be encrypted. What type of drive could fulfill this requirement?

  • RAID 0

  • VPN

  • SED

  • PKI-SSD

Question 17 of 20

Your company has recently deployed endpoint detection and response (EDR) solutions across the organization. As a security analyst, you are reviewing the endpoint logs and notice several hundred login attempts that were successful after multiple failures from the same IP address. What is the MOST likely security issue these logs indicate?

  • Phishing attack

  • Brute force attack

  • Insider threat

  • Man-in-the-middle attack

  • Denial of Service (DoS) attack

Question 18 of 20

Which of the following best describes a method that packages an application along with its dependencies into a standardized unit for software development?

  • Virtual machines

  • Containerization

  • Function as a Service (FaaS)

  • Hardware security module (HSM)

Question 19 of 20

A security analyst needs to investigate a potential data breach that is suspected to have occurred over the past week. The investigation requires correlating log data from firewalls, servers, and intrusion detection systems to identify suspicious patterns and trace the timeline of events. Which of the following tools is BEST suited for this type of historical analysis and data correlation?

  • A real-time network performance monitor

  • A packet capture utility

  • A security operations dashboard

  • A system vulnerability scanner

Question 20 of 20

During a routine vulnerability assessment of the network, an analyst receives a notification of potential malicious traffic that, upon further investigation, turns out to be legitimate and normal network activity. What does this notification exemplify?

  • A false negative

  • A false positive

  • An intrusion attempt

  • A true positive