00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

Which method is leveraged by system administrators in an operating system to prevent the execution of unauthorized software, regardless of whether it is malicious?

  • Application whitelisting

  • Allowing automatic administrative privilege elevation

  • Implementing strict file permissions

  • Restricting the allocation of system resources to the software

Question 2 of 15

What is the primary role of monitoring in relation to indicators within a security infrastructure?

  • Enforcing policy by shutting down systems that do not adhere to predefined configurations

  • Remediating vulnerabilities to prevent the exploitation of a system

  • Conducting retrospective analysis to determine the root cause of a security incident

  • Identifying unusual patterns or behavior that may signify a security incident

Question 3 of 15

Security professionals often advise against jailbreaking (iOS) or rooting (Android) a corporate-owned mobile device. Which of the following best explains why this practice is considered a significant security risk?

  • It forces the device to install apps exclusively from the official app store, reducing exposure to malware.

  • It disables built-in code-signing and sandbox protections, allowing unvetted apps to run with elevated privileges.

  • It automatically enables full-disk encryption by default, making user data inaccessible to attackers.

  • It ensures the device continues to receive manufacturer security patches sooner than stock devices.

Question 4 of 15

Which operational control involves identifying, containing, and recovering from security incidents?

  • Change management

  • Incident response

  • Access controls

Question 5 of 15

A financial services company relies on a third-party for its core customer relationship management (CRM) software. During a routine review, the company's security team discovers that the vendor has no formal process for security audits and lacks clear contractual security obligations. Which of the following would be the MOST effective initial step to mitigate the supply chain risk posed by this vendor?

  • Isolate the CRM software on a dedicated, segregated network segment.

  • Immediately begin searching for an alternative CRM vendor with a better security reputation.

  • Establish contractual security requirements and a right-to-audit clause with the vendor.

  • Encrypt all data in transit between the company's network and the vendor's CRM software.

Question 6 of 15

A company is about to enter into an agreement with a cloud service provider. Which of the following should the company primarily focus on to ensure timely and effective remediation of service interruptions?

  • Annualized Loss Expectancy (ALE)

  • Recovery Time Objective (RTO)

  • Reconnaissance

  • Mean Time to Repair (MTTR)

Question 7 of 15

An organization is undergoing a major upgrade to their existing network infrastructure. Which of the following would BEST ensure that the security implications of the upgrade are appropriately addressed before deployment?

  • Approval Process

  • Maintenance Window

  • Impact Analysis

  • Updating Diagrams

Question 8 of 15

What type of backup is a copy of the entire state of a system and it can be used to restore that system and other similar systems to that exact state/configuration?

  • Differential

  • Full

  • Incremental

  • Image

Question 9 of 15

What process converts plaintext into a coded format to prevent unauthorized access?

  • Tokenization

  • Hashing

  • Encryption

  • Obfuscation

Question 10 of 15

What term is used to describe the process by which the urgency and importance of a security incident are increased to ensure adequate attention and resources are allocated to resolve it?

  • Amplification

  • Escalation

  • Intensification

  • Elevation

Question 11 of 15

An organization uses electronic door locks that require employee badges to access secure areas. The company wants to ensure that during a power outage, the doors to sensitive areas remain locked to maintain security, while emergency exits allow personnel to evacuate safely. Which setting should be applied to the locks on sensitive areas to meet this requirement?

  • Fail-open

  • Fail-closed

  • Fail-over

  • Load balancing

Question 12 of 15

During a routine audit, you discover that an employee has been connecting their workstation to the internet via a public Wi-Fi network at a local coffee shop to complete work tasks when off-site. Which of the following presents the greatest security risk in this scenario?

  • The lack of secure network communication channels on the public network.

  • Outdated anti-virus software on the employee's workstation.

  • The age and speed of the Wi-Fi access point in the coffee shop.

  • Unauthorized software installations on other workstations within the company's secure network.

Question 13 of 15

A company's information security policies have not been updated in five years. Which of the following is the MOST significant security-related risk of using these outdated policies?

  • The cost of training employees on the outdated policies will increase.

  • The policies may no longer comply with new data privacy regulations.

  • The policies may fail to address emerging threats and vulnerabilities.

  • The policy documents may refer to decommissioned systems and applications.

Question 14 of 15

A company needs its critical applications to remain operational with minimal downtime, even in the event of hardware failures. Which strategy is most appropriate to meet this requirement?

  • Implementing a server cluster with load balancing

  • Using a single powerful server with redundant components

  • Deploying encryption to secure data at rest

  • Scheduling regular system updates during low usage periods

Question 15 of 15

A company's network administrator has discovered a system that is exhibiting erratic behavior, including slow performance and repeated crashes. After performing a system scan, the administrator found unauthorized software running with system-level privileges. Which type of malware is MOST likely responsible for these symptoms?

  • This system is most likely infected by a rootkit aiming to obtain elevated privileges while avoiding detection.

  • This system is most likely experiencing the effects of a logic bomb that has been activated and is disrupting system performance.

  • This system is most likely compromised due to a keylogger that is monitoring and transmitting keyboard input, causing system instability.

  • This system is most likely infected by ransomware which is encrypting files, resulting in performance issues and system crashes.