00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

Which of the following is the BEST deployment option for a company looking to enhance the security of their web applications by monitoring and potentially blocking SQL injection attacks and cross-site scripting attempts?

  • Deploy a specialized Web application firewall in front of the web server environment.

  • Install a host-based firewall on the web application server.

  • Block port HTTP/80 to ensure traffic is encrypted over HTTPS/443 and immune to SQL Injections

  • Implement a network-based firewall at the network perimeter.

Question 2 of 20

Your company has issued laptops to its employees for remote work. During a routine security audit, you identify that these laptops come with pre-installed software from the manufacturer that is not being used by the employees. What concerns should you have regarding this software from a security perspective?

  • This software may contain vulnerabilities that could be exploited by attackers because they often go unmanaged and unpatched.

  • The software could be useful for productivity, hence poses no significant risk.

  • This software can take up disk space, but it does not pose any security concerns.

  • The employees may use this software regularly, which could lead to potential data leaks.

Question 3 of 20

Which of the following physical security controls is designed to prevent unauthorized vehicles from entering a restricted area?

  • Bollards

  • Lighting

  • Fencing

  • Access control vestibule

Question 4 of 20

A security analyst is reviewing authentication logs and observes a high volume of failed login attempts originating from a single IP address. The attempts are distributed across hundreds of different user accounts, with only one or two password attempts per account before moving to the next. Which of the following security controls is specifically designed to frustrate this type of attack?

  • Geofencing

  • Account lockout policy

  • Password complexity policy

  • Multi-factor authentication (MFA)

Question 5 of 20

During an organization's risk management activities, how should the risk register be maintained?

  • It should be modified only if a risk actually materializes and causes an incident.

  • It should be updated only when a new risk is first identified.

  • It is a living document that must be reviewed and updated on a regular schedule, even when no new risks are identified.

  • It should be finalized after the initial risk assessment and left unchanged for the remainder of the project or operational period.

Question 6 of 20

What is the primary purpose of classifying data within an organization's security policy?

  • To assign a level of sensitivity to data and determine appropriate security controls

  • To reduce the amount of data stored by the organization

  • To reduce the overall cost associated with data storage and management

  • To increase the intrinsic value of the organization's data

Question 7 of 20

In the context of enhancing security operations, what is a primary benefit of implementing automation?

  • Minimization of human error in repetitive tasks

  • Improvement of user authentication protocols

  • Automated patch management for out-of-date software

  • Enforcement of stronger password policies

Question 8 of 20

Which technology prevents unauthorized access to network resources by inspecting incoming and outgoing traffic and allowing or blocking it according to predefined security rules?

  • Virtual Private Network

  • Intrusion Detection System

  • Firewall

  • Security Information and Event Management system

Question 9 of 20

You are on the security team for a manufacturing company. The network architecture group wants to replace the appliance that currently intermediates all outbound web traffic from production servers. The device receives each server's HTTP/HTTPS request, forwards the request to the Internet using its own public IP address, and then returns the response. Because of this design, public web sites can see only the appliance's address, not the private IP of the originating server. Which type of network appliance is the team planning to replace?

  • Firewall

  • Router

  • Switch

  • Proxy server

Question 10 of 20

A company plans to revamp its network infrastructure to enhance the ability to centrally manage network traffic and resources while also dynamically adapting to changing business needs. Which networking approach should the company implement to gain control over traffic flow and allow for the rapid provisioning of network services?

  • Software-defined networking

  • Network function virtualization

  • Content delivery network

  • Traditional network model with static configurations

Question 11 of 20

Which type of control should be implemented to restrict access to a secure data center area, ensuring that only authorized personnel can enter?

  • Physical access controls

  • Perimeter controls

  • Administrative controls

  • Logical access controls

Question 12 of 20

What type of access control restricts user access to systems based on the current time?

  • Attribute-based access controls

  • Time-of-day restrictions

  • Least privilege

  • Role-based access controls

Question 13 of 20

Your company has recently updated its information security policy to include more robust requirements for user authentication. You are tasked with ensuring that password management adheres to the new standards, which include regular password changes and complexity requirements. What is an acceptable method to enforce these updated policies?

  • Enforce a password history policy that prevents the reuse of the last 24 passwords.

  • Email users their new passwords monthly to ensure they are regularly updated.

  • Allow users to reuse the same password with incremental changes, such as adding a number to the end each time.

  • Implement a policy that mandates password changes only following a confirmed security incident.

  • Encourage users to write down their passwords and store them securely in their desk drawers.

  • Avoid informing users about the complexity requirements to ensure they choose passwords that are easy for them to remember.

Question 14 of 20

A freshly recruited member of a marketing firm is in the orientation phase and requires guidance on the organization's expectations regarding the use of digital assets and communications networks. To communicate the rules of engagement and the potential sanctions for contravention, which document should be introduced to the recruit?

  • Response protocol for security breaches

  • Guidelines for resuming operations after an unplanned event

  • Organizational roadmap for general security management

  • Document emphasizing guidelines for digital resource usage

Question 15 of 20

ACME Tech, an international software development company, has failed a recent audit due to not keeping adequate records of its European users' data activities. As a security manager, what is the most immediate action to take to rectify this situation and prevent substantial financial repercussions from European regulatory authorities?

  • Arrange an immediate security training session for the development team to reinforce best practices in secure coding.

  • Deploy an updated firewall and intrusion prevention system to better protect the perimeter of the corporate network.

  • Initiate a comprehensive review of the company's physical and electronic access controls.

  • Correct the record-keeping deficiencies to conform to the data protection standards set forth by European authorities.

Question 16 of 20

An administrator is configuring permissions for a new network share according to the principle of least privilege. Members of the accounting department must be able to add and edit files in the folder. Members from the auditing and sales departments should only be able to review the contents. Which set of permissions should the administrator assign to the accounting, auditing, and sales groups, respectively?

  • Modify for accounting, Read & execute for auditing, Read for sales

  • Write for accounting, Read for auditing and sales

  • Full control for accounting, Read & execute for auditing, Write for sales

  • Read & execute for accounting, Write for auditing, Modify for sales

Question 17 of 20

A company has noticed unusual activity on their network and has started an investigation. As a security analyst, you are reviewing logs from various endpoints to identify the source of the activity. Which of the following log entries would likely indicate a security incident in progress?

  • Periodic security scanning by the in-house vulnerability management tool.

  • A single successful login to a user account during working hours.

  • Repeated login failures from a single source, followed by a successful login to an administrative account.

  • Scheduled system updates being applied outside of office hours.

Question 18 of 20

Which of the following is an example of a possession factor that could be used for multi-factor authentication?

  • A password

  • A hardware authentication token

  • A mobile app authorization request

  • Eye color

Question 19 of 20

A multinational corporation with strict data protection policies has discovered unauthorized instances of sensitive information, such as client account details, being shared via email with external parties. To mitigate this risk, which strategy should the security team prioritize?

  • Applying full disk encryption to all devices within the organization to protect data at rest

  • Deploying updated antivirus software across all endpoints to address security concerns

  • Implementing a solution at the network egress points to monitor content and prevent unauthorized transmissions based on predefined policies

  • Enhancing user access controls on all systems containing sensitive information

Question 20 of 20

Which of the following algorithms is a symmetric encryption algorithm?

  • Twofish

  • DSA

  • Diffie-Hellman

  • RSA