00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

A company wants to enhance the defense against unauthorized access in its server room. Which of the following methods should be implemented to achieve the utmost assurance of restricting entry based on verifying unique individual traits?

  • Maintaining sign-in logs at the entrance monitored by security personnel

  • Biometric access control systems

  • Installation of surveillance cameras, known as closed-circuit television (CCTV), system around the server room

  • Implementing coded access cards for secure doors

Question 2 of 15

An organization has decided to implement an application allow list policy to reduce the risk of malware infections on its network. Which of the following best describes the action the organization is taking?

  • Permitting all installed software to run but monitoring their behaviors for any suspicious activity.

  • Creating a list of authorized software that is allowed to run on company systems.

  • Compiling a list of software that users believe should not be installed on their systems.

  • Allowing users to decide which software can be executed on their individual workstations.

Question 3 of 15

Which network appliance is primarily used to balance traffic among multiple servers to enhance performance and scalability?

  • Proxy server

  • Jump server

  • Load balancer

  • Intrusion prevention system (IPS)/intrusion detection system (IDS)

Question 4 of 15

Which type of security control is designed to limit the damage and impact after a security incident has occurred?

  • Detective controls

  • Compensating controls

  • Preventive controls

  • Corrective controls

Question 5 of 15

You are a network security technician at a mid-sized company. Your employer is planning for significant growth and the CIO has tasked you with implementing a system to consolidate all critical network device logs to a central location. The system should support logs from all routers, firewalls, switches and business critical servers and should send alerts in the event of security issues. What type of solution would best meet these requirements?

  • Central log point

  • SIEM

  • Hardware security module

  • DLP

Question 6 of 15

What term describes the process of determining whether a detected vulnerability is actually present?

  • False positive

  • Confirmation

  • Threat hunting

  • Reporting

Question 7 of 15

Your company has recently rolled out a new security awareness training program focused on recognizing social engineering attacks. To ensure the effectiveness of the training, what is the MOST effective method to evaluate employee understanding and application of the training content?

  • Including a quiz at the end of the training session

  • Unannounced network scans after training completion

  • Publishing a quarterly newsletter highlighting social engineering threats

  • Conducting unannounced phishing simulation campaigns

Question 8 of 15

Which of the following measures is MOST effective in preventing vehicular access to a facility’s entrances?

  • Access control vestibule

  • Security guard

  • Bollards

  • Fencing

Question 9 of 15

An organization is considering updating their wide area network architecture to improve the management of security policies and the application of security updates across the network. What is the PRIMARY security benefit of transitioning to a Software-Defined Wide Area Network?

  • Centralized management of security policies and updates

  • Dynamic path selection for bandwidth optimization

  • Optimized performance through application-aware routing

  • Reduction in operational costs by utilizing virtualization

Question 10 of 15

Which method is leveraged by system administrators in an operating system to prevent the execution of unauthorized software, regardless of whether it is malicious?

  • Allowing automatic administrative privilege elevation

  • Restricting the allocation of system resources to the software

  • Implementing strict file permissions

  • Application whitelisting

Question 11 of 15

A corporation with a large number of Internet of Things (IoT) devices deployed across multiple office locations is reviewing its security architecture to address concerns regarding the unauthorized disclosure of sensitive data collected by these devices. Which of the following security approaches would BEST mitigate this risk?

  • Implement network segmentation to restrict IoT traffic to a dedicated portion of the network.

  • Enable full disk encryption on all IoT devices to protect data at rest.

  • Enable a host-based firewall on each IoT device to prevent unauthorized access.

  • Require multi-factor authentication for all users accessing the IoT devices.

Question 12 of 15

An organization is considering acquiring new hardware components from an unfamiliar manufacturer. As the security analyst, you are tasked with evaluating potential risks before making the purchase. Which of the following actions should you take to conduct a thorough supply chain analysis?

  • Arrange a demonstration of the equipment's features by the vendor's sales team.

  • Verify that the equipment integrates with the organization's current network setup.

  • Investigate the vendor's compliance with international trade regulations and industry standards.

  • Examine the vendor's component sourcing and manufacturing processes for security vulnerabilities.

Question 13 of 15

You just got a new Microsoft Windows laptop. The laptop includes a biometric fingerprint scanner to log into the laptop in addition to your unique username. What type of multi-factor authentication is your fingerprint?

  • Something you can do

  • Something you are

  • Something you have

  • Something you know

Question 14 of 15

Which of the following authorization models uses a set of protocols designed for passing the authorization and authentication information of a user between different security domains?

  • Discretionary Access Control (DAC)

  • Role-Based Access Control (RBAC)

  • Federated identity management

  • Mandatory Access Control (MAC)

Question 15 of 15

A country's primary power grid and water treatment facilities have experienced a series of sophisticated, coordinated cyber attacks aimed at causing widespread service disruption. Which of the following threat actors is MOST likely responsible for this type of attack?

  • Nation-state

  • Organized crime

  • Insider threat

  • Hacktivist