00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

Which term describes the requirement to control access to data based on the physical location of the user accessing the data or the location of the data processing?

  • Geolocation restrictions

  • Data sovereignty

  • Data classification

  • Data residency

Question 2 of 20

Which set of rules is typically used by an organization to define the complexity and renewal frequency requirements for user credentials?

  • Network configuration protocols

  • Password policy

  • Audit guidelines

  • Data classification standards

Question 3 of 20

Which of the following best describes a common use case for automation in a security operations context?

  • Conducting manual penetration tests on network assets

  • Providing live technical support to end-users

  • Automating the process of provisioning and de-provisioning user accounts

  • Monitoring individual bandwidth usage and allocating resources accordingly

Question 4 of 20

What type of security threat occurs when an attacker manipulates file-referencing variables with sequences like ../ to access files and commands located outside the web server's intended root folder?

  • Buffer overflow

  • Cross-site scripting

  • Directory traversal

  • SQL injection

Question 5 of 20

Your company has recently rolled out a new security awareness training program focused on recognizing social engineering attacks. To ensure the effectiveness of the training, what is the MOST effective method to evaluate employee understanding and application of the training content?

  • Conducting unannounced phishing simulation campaigns

  • Including a quiz at the end of the training session

  • Unannounced network scans after training completion

  • Publishing a quarterly newsletter highlighting social engineering threats

Question 6 of 20

What type of security device passively monitors network traffic and alerts administrators or other systems when it detects suspicious activities or known threats?

  • Intrusion Prevention System (IPS)

  • Firewall

  • Load balancer

  • Intrusion Detection System (IDS)

Question 7 of 20

A security manager has placed conspicuous warning signs around the perimeter of a data center. The signs state, "No Trespassing - Violators Will Be Prosecuted." What type of security control does this action represent?

  • Compensating

  • Deterrent

  • Preventive

  • Corrective

Question 8 of 20

Which factor is a direct financial consideration when assessing the implementation of a new security control within an organization?

  • Time to remediate vulnerabilities

  • Total cost of ownership

  • Number of users supported

  • Time-to-market

Question 9 of 20

A financial organization is moving its internally developed customer-facing web portal to a public Infrastructure-as-a-Service (IaaS) provider. Because the site processes regulated personal data, the security team reviews the shared-responsibility matrix. Which activity will remain the organization's responsibility after the migration?

  • Implementing secure coding practices and patch management for the portal's application code.

  • Maintaining environmental controls such as humidity and temperature within the cloud data center.

  • Upgrading the provider's core network components, such as routers and switches, to support higher throughput.

  • Ensuring the physical servers hosting the service are updated with the latest firmware patches.

Question 10 of 20

What technique should be used to restrict dedicated administrative access to only the necessary times when it is needed, thereby reducing the exposure time of elevated privileges?

  • Just-in-time permissions

  • Multifactor authentication

  • Security group assignments

  • Password vaulting

Question 11 of 20

Which of the following is the BEST description of the purpose of version control in the context of change management and security?

  • To automatically update documentation and diagrams when changes are made

  • To manage and control software code, configurations, and other artifacts

  • To quickly identify and resolve issues caused by recent changes

  • To facilitate collaboration between different teams and departments

Question 12 of 20

Which of the following statements BEST explains why a network firewall alone cannot provide the same level of protection as encryption for data stored on a network file server?

  • Encryption secures data moving across the network, whereas a firewall secures all data that resides on the server's drives.

  • A properly configured firewall automatically encrypts any files transmitted or stored behind it, eliminating the need for separate data-at-rest encryption.

  • Neither firewalls nor encryption protect data at rest; only physical security controls such as locks and guards can do so.

  • A firewall enforces access rules for network traffic, but only encryption renders the stored data unreadable to unauthorized users, so both controls are required to protect data at rest.

Question 13 of 20

A junior security administrator has been tasked with recommending solutions to prevent unauthorized individuals from physically entering a company's new sensitive data center. The administrator is considering options such as biometric scanners, mantraps, and security guards. Which category of security controls do these solutions fall under?

  • Physical controls

  • Perimeter controls

  • Administrative controls

  • Logical controls

Question 14 of 20

Which concept refers to designing a system capable of handling increased demand by adding resources?

  • Resilience

  • Redundancy

  • Scalability

  • Availability

Question 15 of 20

You work for a company that has a contract with the US government. As part of that contract there is a document that outlines the scope of the work to be performed, period of performance and schedule of deliverables. Which of the following best describes this document?

  • SOW

  • MOA

  • SLA

  • MOU

Question 16 of 20

A network administrator is configuring a new file server. The goal is to simplify permissions by creating groups such as 'Marketing', 'Developers', and 'Executives'. Each user will be assigned to one or more of these groups, and their access to files and folders will be determined solely by their group memberships. Which access control model is the administrator implementing?

  • Discretionary Access Control (DAC)

  • Mandatory Access Control (MAC)

  • Role-Based Access Control (RBAC)

  • Attribute-Based Access Control (ABAC)

Question 17 of 20

An employee receives a phone call from an individual claiming to be a member of the IT department's security audit team. The caller explains that due to a recent security incident, they are verifying all user credentials. The caller uses a professional tone, refers to a non-existent ticket number, and asks the employee to provide their username and password for verification. Which social engineering technique does this scenario BEST describe?

  • Pretexting

  • Phishing

  • Smishing

  • Watering hole

Question 18 of 20

As an IT manager, you've been tasked with ensuring that electronic transactions between suppliers and your company cannot later be denied by either party. Which of the following security goals and concepts should you prioritize to meet this requirement?

  • Availability

  • Integrity

  • Non-repudiation

  • Confidentiality

Question 19 of 20

Which of the following best describes the legal implications that should be considered when managing a security program for an organization operating within a specific country?

  • Adherence to local business norms

  • Alignment with regional trends

  • Compliance with national laws and regulations

  • Following global standards

Question 20 of 20

During an audit, your company's security policies regarding endpoint protection are under review. While examining the current solutions, you note that the recently deployed security system on critical endpoints is not relying solely on signature-based detection to mitigate attacks. Considering its capabilities, which feature of this system aligns with those of a robust HIPS to enhance the security of these endpoints?

  • Behavioral monitoring to analyze and block activities that may signify malicious intent

  • Performing retrospective log analysis to identify the source and method of a data breach

  • Updating its database of virus definitions frequently to catch the latest known malware

  • Applying system hardening techniques to reduce the attack surface of the endpoints