00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

Which of the following best describes the concept of high availability in the context of security architecture?

  • The ability of a system to handle increased loads by distributing tasks across multiple servers

  • Ensuring operational performance for a higher than normal period by means of redundancy and failover mechanisms

  • The duplication of critical components of a system with the intention of increasing reliability of the system

  • Designing systems in a way that reduces their energy consumption to ensure longer operating times

Question 2 of 15

Which identity and access management solution creates a single point of failure whereby compromising one set of user credentials could let an attacker access every connected application the user is authorized for?

  • IPSec virtual private network (VPN) tunnel

  • Single sign-on (SSO) service

  • Discretionary access control (DAC) model

  • Network segmentation using VLANs

Question 3 of 15

Which of the following best describes a method that packages an application along with its dependencies into a standardized unit for software development?

  • Function as a Service (FaaS)

  • Containerization

  • Virtual machines

  • Hardware security module (HSM)

Question 4 of 15

A corporation needs to secure its data while it is sent from the main office to a distant branch. To achieve confidentiality and effective management of cryptographic keys, which protocol should be adopted?

  • IPsec

  • PPTP

  • WEP

  • HTTPS

Question 5 of 15

What term is used to describe a component within a system that, if it were to fail, would cause the entire system to cease functioning?

  • Documentation

  • Single point of failure

  • Limiting factor

  • Scalability

Question 6 of 15

A multinational corporation is looking to expand its services into a new country. Which of the following should be MOST thoroughly evaluated to ensure compliance with the security requirements of the new market?

  • Local/Regional laws and regulations

  • Global cybersecurity trends

  • Headquarters country legal standards

  • Company's existing security policies

Question 7 of 15

A development team is implementing a 'shift-left' security strategy to identify vulnerabilities early in the software development lifecycle (SDLC). The team wants to analyze the application's source code for security flaws, such as potential SQL injection and buffer overflows, without executing the program. Which of the following techniques should the team use?

  • Web application firewall (WAF)

  • Dynamic Application Security Testing (DAST)

  • Static Application Security Testing (SAST)

  • Fuzzing

Question 8 of 15

Crucial Technologies wants to invest in a tool to assist in preventing intellectual property from being exfiltrated from the company network. Which tool would you suggest?

  • DLP

  • SIEM

  • Antivirus

  • SCAP

Question 9 of 15

A systems administrator is implementing a new authentication policy that requires users to provide their password and a six-digit code from a hardware token. Which of the following security concepts does this scenario BEST describe?

  • Multifactor authentication

  • Authorization

  • Biometric authentication

  • Single sign-on

Question 10 of 15

A company is planning to assess its network security by simulating an attack from malicious hackers. They aim to identify potential security gaps and vulnerabilities that could be exploited. What is the BEST type of penetration testing approach for this scenario?

  • Partially Known Environment Penetration Test

  • Known Environment Penetration Test

  • Unknown Environment Penetration Test

  • Reconnaissance

Question 11 of 15

An organization needs to encrypt a large amount of data efficiently for storage on their servers. Which encryption method would be most appropriate for this task?

  • Encryption using public and private keys

  • Quantum encryption

  • Hashing algorithms

  • Encryption using a shared secret key

Question 12 of 15

Which of the following best describes a guideline for creating strong passwords that can help reduce the risk of unauthorized access?

  • Passwords should consist solely of memorable personal information, like birthdays or names, to ensure they are not forgotten.

  • Passwords should be at least 8 characters long with a mix of uppercase and lowercase letters, numbers, and special characters.

  • Passwords should be simple words found in the dictionary to make them easy to remember.

  • Passwords should be reused across different accounts for consistency and ease of recall.

Question 13 of 15

A company is about to deploy a system for securely exchanging contracts with its vendors. They want to ensure that a vendor cannot successfully claim they did not sign a contract when they actually did. Which of the following should the company implement to guarantee this requirement?

  • Add a salting mechanism to their password storage system.

  • Implement digital signatures for all electronic contracts to provide proof of origin.

  • Generate and compare hash values for each contract before and after signing.

  • Enforce a strict multi-factor authentication method for system access.

Question 14 of 15

Which term best describes an organization’s decision to undertake risks that offer a reasonable balance between potential benefits and potential harm, without significantly swaying towards either risk aversion or risk seeking?

  • Neutral

  • Risk Mitigation

  • Expansionary

  • Conservative

Question 15 of 15

A developer is writing code for a new application and wants to implement controls to prevent buffer overflow attacks. Which of the following BEST describes the role of input validation in this context?

  • It is primarily used to prevent SQL injection and is not an effective control for buffer overflows.

  • It is only effective for client-side protection and cannot prevent server-side buffer overflow attacks.

  • It completely mitigates the risk of buffer overflow vulnerabilities, making other protections redundant.

  • It is a primary defense mechanism but should be combined with other techniques like bounds checking and runtime protections for comprehensive security.