00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

How can a network administrator secure a switch port to prevent unauthorized devices from connecting to the network, while also mitigating the risk of address flooding attacks?

  • Enabling 802.1X authentication

  • DHCP snooping

  • Implementing switch port security measures

  • Configuring a captive portal

Question 2 of 15

An attacker forces a system to use a weaker encryption protocol that has known vulnerabilities. What type of cryptographic attack is being performed?

  • Replay attack

  • Side-channel attack

  • Downgrade attack

  • Birthday attack

Question 3 of 15

Which access control method combines elements such as user role, the resource being accessed, and the current time to make an access decision?

  • Attribute-based access control

  • Role-based access control

  • Discretionary access control

  • Mandatory access control

Question 4 of 15

A company has implemented a centralized proxy to manage web traffic. Which of the following tasks would MOST effectively utilize the proxy to enhance the organization's security posture?

  • Restricting all users' access to the control panel on their respective machines.

  • Inspecting and logging web traffic for analysis and compliance.

  • Allowing users to tunnel web traffic through SSH to enhance encryption.

  • Configuring automatic backups of user data every 24 hours.

Question 5 of 15

You work for a company that processes customers' personal information as part of its business operations. This part of operations presents a risk to the company. What is this type of risk called?

  • Residual risk

  • Tolerated risk

  • Inherent risk

  • Control risk

Question 6 of 15

What is the primary purpose of using questionnaires in third-party risk assessment and management?

  • To systematically collect security-related information from third-party vendors

  • To conduct penetration testing on the vendor's systems

  • To evaluate the financial stability of the third-party vendors

  • To legally bind the third-party vendors to a contract

Question 7 of 15

When securing a wireless network, which of the following is important for preventing unauthorized access and ensuring that only authenticated users can connect?

  • Implementing MAC filtering

  • Enabling WPA3

  • Using WEP encryption

  • Hiding the SSID

Question 8 of 15

During a routine audit, you discover that an employee has been connecting their workstation to the internet via a public Wi-Fi network at a local coffee shop to complete work tasks when off-site. Which of the following presents the greatest security risk in this scenario?

  • The age and speed of the Wi-Fi access point in the coffee shop.

  • Unauthorized software installations on other workstations within the company's secure network.

  • Outdated anti-virus software on the employee's workstation.

  • The lack of secure network communication channels on the public network.

Question 9 of 15

What is the primary benefit of using containerization in a security architecture?

  • It allows unlimited data storage capacity.

  • It isolates applications to enhance security and manageability.

  • It integrates all applications into one operating system for better performance.

  • It completely eliminates the need for physical servers.

  • It ensures that applications have direct access to hardware resources.

  • It automates the process of data recovery.

Question 10 of 15

An employee receives a text message from the company's technical support team. The message asks to validate the employee's email credentials by replying with their login details due to irregular activities. Which action by the employee aligns with the best security practices in this scenario?

  • Disregard the message assuming it to be a part of the technical team's routine security checks.

  • Respond with the email credentials as requested to promptly address the alleged security issue.

  • Verify the legitimacy of the message by contacting the support team through official company channels.

  • Inform peers about the request by forwarding the message to create awareness of potential security checks.

Question 11 of 15

An organization has just deployed a new network infrastructure device and assigned a systems administrator to ensure it is secured. What is the BEST initial action the systems administrator should take to mitigate the risk of unauthorized access due to common credential attacks?

  • Change the default credentials immediately

  • Conduct a full vulnerability scan on the device

  • Enforce account lockout policies

  • Update the firmware to the latest version

Question 12 of 15

Which of the following best describes a snapshot in the context of data backups?

  • A point-in-time representation of a system's state or data that does not require storing a full copy of the data set.

  • A complete copy of a system's data and configurations at a specific point in time.

  • A method that only backs up data that has changed since the last full backup.

  • The process of duplicating data in real-time to a secondary location for fault tolerance.

Question 13 of 15

A company is required to set up a secure connection between their headquarters and a remote office. The solution must work directly with the Internet Protocol to secure all traffic, support traversal through network address translators, and provide a mechanism for encryption and secure key management. What would be the most suitable protocol to employ for this scenario?

  • Internet Protocol Security (IPSec)

  • Point-to-Point Tunneling Protocol (PPTP)

  • Layer Two Tunneling Protocol (L2TP)

  • Secure Sockets Layer/Transport Layer Security (SSL/TLS)

Question 14 of 15

A company's web server suddenly experiences an overwhelming amount of traffic, causing legitimate users to be unable to access the website. Investigation reveals that the traffic surge is due to a flood of network requests with spoofed IP addresses, indicating a possible DDoS attack. Which type of DDoS attack is most likely occurring if the attack traffic is magnified by the attackers using public network services without the need for a botnet?

  • Ping flood attack

  • Reflected DDoS attack

  • SYN flood attack

  • Amplified DDoS attack

Question 15 of 15

Upon discovering a data breach involving unauthorized access to the customer records system, what is the PRIMARY action the security team should focus on according to standard security protocols?

  • Start documenting the details of the breach and response actions taken.

  • Immediately isolate affected systems to stop the spread of the breach.

  • Notify the company's legal team and prepare for public disclosure.

  • Prioritize the review of security logs to trace the origin of the attack.