00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

As a security analyst in a large organization, you are responsible for establishing a secure baseline configuration for new Windows and Linux servers being deployed in the data center. What is the primary reason for creating this secure baseline?

  • To allow easy identification of servers in the network diagram and asset management database.

  • To provide a guide for troubleshooting server issues by the technical support team.

  • To document the standard administrative practices and server maintenance procedures.

  • To ensure that all systems start from a known state of security and configurations that address security concerns.

Question 2 of 20

A security analyst at a financial institution is tasked with conducting a risk analysis. The analyst needs to prioritize risks to present to the executive board, which prefers an overview based on the general magnitude of impact rather than precise numerical values. Which approach should the analyst use to assess and present the risk levels?

  • Annualized Rate of Occurrence Analysis

  • Qualitative Risk Analysis

  • Disaster Recovery Strategy

  • Quantitative Risk Analysis

Question 3 of 20

ACME Tech, an international software development company, has failed a recent audit due to not keeping adequate records of its European users' data activities. As the security manager, what is the most immediate action to take to rectify this situation and prevent substantial financial repercussions from European regulatory authorities?

  • Correct the record-keeping deficiencies to conform to the data-protection standards set forth by European authorities.

  • Deploy an updated firewall and intrusion-prevention system to better protect the perimeter of the corporate network.

  • Arrange an immediate security training session for the development team to reinforce best practices in secure coding.

  • Initiate a comprehensive review of the company's physical and electronic access controls.

Question 4 of 20

When developing information security policies and controls for a multinational organization, which set of legal and regulatory requirements must be considered to ensure full compliance?

  • Only international treaties, ignoring local and national statutes

  • All applicable local, national, and international laws and regulations

  • Only the organization's local municipal or state laws

  • Only the national (federal) laws of the country where headquarters is located

Question 5 of 20

A healthcare company needs to ensure the privacy of its patients' health records. When deploying a new online patient portal, which measure is most effective for protecting the privacy of health records while they are being accessed and transmitted through the portal?

  • Encrypting data in transit

  • Implementing geographic restrictions on where the health records can be accessed

  • Requiring multi-factor authentication for user access to the portal

  • Applying data masking techniques to the records before storage

Question 6 of 20

A security administrator is implementing an encryption system that uses two distinct, but related keys. One key is used for encrypting data, and the other is used for decrypting it. What type of cryptography is being implemented?

  • Asymmetric key cryptography

  • Hashing

  • Symmetric key cryptography

  • Block cipher

Question 7 of 20

A network technician is performing the initial setup of a new wireless router. Which of the following is the most important first step the technician should take to secure the device?

  • Updating the firmware to the latest beta release

  • Implementing port forwarding

  • Changing the default credentials

  • Disabling unused ports

Question 8 of 20

An organization has deployed a Unified Threat Management (UTM) device to consolidate multiple security functions. While reviewing security logs, it is noted that a specific alert keeps recurring, and it has been determined to be a false positive. To improve the efficiency of security operations, what should be done to handle this situation without compromising the actual threat detection capability of the UTM?

  • Increase the sensitivity of the UTM to capture more events.

  • Manually review all alerts generated by the UTM.

  • Perform alert tuning specific to the false positive condition.

  • Disable the alert to prevent further false positives.

Question 9 of 20

During a routine update, an IT administrator accidentally overwrites crucial configuration files, causing incorrect data to be displayed to users. Which fundamental security principle is most impacted by this incident?

  • Integrity

  • Confidentiality

  • Availability

  • Authentication

Question 10 of 20

In an organization's risk management framework, when might an exemption be most appropriately granted?

  • When there is insufficient budget to implement any security measures and all risks need to be accepted

  • Whenever a key stakeholder dislikes the constraints imposed by a certain policy or standard

  • When compliance with a security policy or control is either not feasible or not cost-effective relative to the reduction in risk it would bring

  • As a habitual practice for lower-priority systems to minimize the effort spent on security

Question 11 of 20

A security team is evaluating new perimeter security solutions to replace their traditional firewall. The primary goal is to gain visibility into and control over the specific web applications being used (e.g., social media, streaming services) and to block threats that leverage application-layer protocols. Which of the following firewall types is specifically designed to meet these requirements?

  • Circuit-level gateway

  • Stateful inspection firewall

  • Next-generation firewall (NGFW)

  • Stateless packet-filtering firewall

Question 12 of 20

A security analyst, reviewing alerts from an Endpoint Detection and Response (EDR) system, notices suspicious command-line activity on a user's workstation indicative of a malware infection. The analyst needs to contain the threat while preserving evidence for a forensic investigation. What is the BEST immediate action for the analyst to take?

  • Immediately power off the workstation to stop the malware's execution.

  • Disconnect the workstation from the network and immediately re-image it from a known-good backup.

  • Run a full antivirus scan on the workstation while it remains connected to the network.

  • Isolate the workstation from the network but leave it powered on.

Question 13 of 20

Your organization is exploring the option of migrating some services to the cloud while maintaining critical systems onsite due to their sensitive nature. As the IT Security Specialist, you've been asked to assess the security considerations for the on-premises systems. Which of the following is a primary security advantage of retaining critical systems on-premises?

  • Reduced physical access risk to systems

  • Complete control over physical and logical security measures

  • Lower initial capital expenditure compared to cloud solutions

  • Increased scalability of critical systems

Question 14 of 20

A corporation with a large number of Internet of Things (IoT) devices deployed across multiple office locations is reviewing its security architecture to address concerns regarding the unauthorized disclosure of sensitive data collected by these devices. Which of the following security approaches would BEST mitigate this risk?

  • Require multi-factor authentication for all users accessing the IoT devices.

  • Enable a host-based firewall on each IoT device to prevent unauthorized access.

  • Implement network segmentation to restrict IoT traffic to a dedicated portion of the network.

  • Enable full disk encryption on all IoT devices to protect data at rest.

Question 15 of 20

A security analyst is reviewing the security posture of a manufacturing plant's Industrial Control System (ICS). The system is considered highly critical and is physically isolated from the company's main IT network. Which of the following represents the MOST appropriate security principle to apply when establishing a baseline for this ICS?

  • A stringent, specialized baseline is required because critical systems must be protected from a wide range of threats, including those that do not originate from the network.

  • The vendor is solely responsible for providing security patches, so a custom baseline is unnecessary.

  • The security baseline can be less stringent than corporate IT systems because the air gap effectively mitigates all major threats.

  • The primary security control is the air gap, so baseline configurations should focus exclusively on preventing network bridging.

Question 16 of 20

Crucial Technologies has an outside team coming in to conduct penetration testing. It has been decided that the engagement is going to be black box testing. This type of testing involves which of the following?

  • Known environment

  • Unknown environment

  • Partially known environment

  • Fully known environment

Question 17 of 20

A company is planning to deploy a major update to its customer relationship management (CRM) system. This update includes security enhancements and new features that customers have been requesting. Which of the following should be the FIRST step to ensure that the security operation aligns with the business impact of the deployment?

  • Conduct an Impact Analysis

  • Determine the Maintenance Window

  • Initiate the Approval Process

  • Update Network Diagrams and Policies

Question 18 of 20

An organization is conducting a Business Impact Analysis. Which metric should be determined to establish the maximum time frame that a critical system can be disrupted before severe impact to business operations occurs?

  • Establishing the data backup frequency is necessary for scheduling maintenance windows.

  • Assessing the annual likelihood of a system failure occurring will forecast the potential interruptions in operations.

  • Calculating the cost of system outages per day can provide insight into potential financial losses.

  • Determining the maximum tolerable downtime for critical systems, otherwise known as the Recovery Time Objective, is essential for prioritizing their restoration.

Question 19 of 20

What is a key activity performed as part of security monitoring to identify unauthorized actions within a network?

  • Modifying access control lists

  • Deploying security patches

  • Installing antivirus software

  • Reviewing security logs

Question 20 of 20

An organization needs to securely establish encryption keys with external partners over the internet without any prior shared secrets. Which cryptographic method BEST facilitates this secure key establishment?

  • Symmetric key distribution

  • MD5 hashing algorithm

  • RSA digital signatures

  • Diffie-Hellman algorithm