00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

What type of vulnerability within virtualized environments allows an attacker to access the host machine from within a virtual machine?

  • SQL injection

  • Buffer overflow

  • VM escape

  • Firmware compromise

Question 2 of 20

A network administrator for a small business wants to simplify the company's security posture by deploying a single appliance that integrates a firewall, intrusion prevention, content filtering, and anti-malware capabilities. Which of the following network appliances BEST describes this type of all-in-one solution?

  • Web Application Firewall (WAF)

  • Proxy server

  • Unified Threat Management (UTM) appliance

  • Next-Generation Firewall (NGFW)

Question 3 of 20

A corporation requires a method to ensure that its staff can connect to internal resources from outside the office environment with assured confidentiality and integrity of data. Which solution would BEST meet this requirement while providing encrypted channels for remote endpoint connectivity?

  • Setting up remote access servers that allow direct connections from the internet.

  • Enforcing perimeter security controls that prevent unauthorized network entry.

  • Configuring encrypted gateways at the network perimeter for enhanced security.

  • Utilizing end-to-end encrypted tunneling services with access control.

Question 4 of 20

A security administrator is verifying a new software update from a trusted vendor. The administrator confirms that the update is digitally signed with the vendor's valid code-signing certificate. Why might this update still pose a security risk to the organization?

  • Code-signing certificates cannot be revoked by the Certificate Authority (CA) once issued.

  • The vendor's build environment could have been compromised, allowing malicious code to be signed with a legitimate certificate.

  • Digital signatures only provide confidentiality for the update package through encryption.

  • A valid digital signature automatically bypasses all antivirus and endpoint protection scanning.

Question 5 of 20

Which of the following options is best suited to securely connect remote branches to the corporate network?

  • Virtual Private Network (VPN)

  • Wi-Fi calling

  • Leased lines without additional security protocols

  • Virtual Local Area Network (VLAN)

  • Multiprotocol Label Switching (MPLS)

  • Secure Sockets Layer (SSL)

Question 6 of 20

Your coworker identified a vulnerability for a 3rd party software solution hosted on premise. The coworker is out sick today and has asked you remediate this issue as quickly as possible. You have identified a patch to fix the security vulnerability from the vendor's official website. What step should you take NEXT?

  • Submit a change request based on the companies change management processes

  • Begin monitoring for related incidients

  • Start the incident response process

  • Install the patch immediately and inform affected users

Question 7 of 20

Which of the following best describes the legal implications that should be considered when managing a security program for an organization operating within a specific country?

  • Alignment with regional trends

  • Compliance with national laws and regulations

  • Following global standards

  • Adherence to local business norms

Question 8 of 20

Your employer recently instituted a new policy that requires employees to sign all internal email communications with their digital certificate. If each employee is using their own unique digital signature what will this provide for the company?

  • Confidentiality

  • Integrity

  • Non-repudiation

  • Availability

Question 9 of 20

You receive a call and the caller ID indicates that it is from your bank. You answer and are told that your account has been compromised. The person on the phone says that before they can proceed you need to verify your account number and security pin. What term best describes this type of social engineering attack?

  • Whaling

  • Spear phishing

  • Smishing

  • Vishing

  • Phishing

Question 10 of 20

After a recent data breach where an adversary successfully exfiltrated sensitive data, the incident response team has completed the containment and eradication stages. Which action would BEST equip the team to perform root cause analysis and determine the original vulnerability exploited?

  • Conducting a thorough analysis of security logs for signs of initial compromise

  • Initiating a campaign to re-educate all users about phishing and social engineering

  • Running a comprehensive vulnerability scan on all networked systems

  • Scheduling a complete review of all organizational security policies and procedures

Question 11 of 20

An organization's staff is distributed across varying locations, each with varying levels of network security. To strengthen their security posture for collaborative efforts, which measure would be most effective in ensuring authorized access to shared company resources?

  • Mandate email encryption for all internal and external communication.

  • Enforce a policy requiring users to change their passwords monthly.

  • Limit the connection times to shared resources to specific hours of the working day.

  • Implement multi-factor authentication for all users when accessing shared company resources.

Question 12 of 20

In the context of designing a highly available web service infrastructure that must remain operational during peak traffic times, which of the following techniques would BEST demonstrate an application of parallel processing concepts for capacity planning?

  • Applying database normalization to reduce data redundancy

  • Enforcing rate limiting on the web service API endpoints

  • Implementing a load balancer to distribute workload across multiple servers

  • Integrating a single sign-on (SSO) solution for user authentication

Question 13 of 20

During a period of international expansion, a company must revise its security governance documentation to ensure ongoing compliance with various regional laws and adherence to best practices. Which type of governance document is most critical to update and maintain to address these requirements?

  • Information Security Policies

  • Disaster Recovery Plans

  • Policies for the Use of Technology Resources

  • Business Continuity Documentation

Question 14 of 20

When developing information security policies and controls for a multinational organization, which set of legal and regulatory requirements must be considered to ensure full compliance?

  • Only the national (federal) laws of the country where headquarters is located

  • Only the organization's local municipal or state laws

  • Only international treaties, ignoring local and national statutes

  • All applicable local, national, and international laws and regulations

Question 15 of 20

You are a security analyst at a financial firm. An employee receives an instant message from a sender claiming to be from the IT department, asking them to click a link and enter their login credentials to update their account. The employee fell for the attack due to the message's specific nature, including correct names of an IT Department employee and the name of the target employee. What type of threat is most likely being attempted?

  • Vishing

  • Spear Phishing

  • Smishing

  • Whaling

Question 16 of 20

An organization with remote employees requires a secure method for connecting to the internal network. Which solution should be used to ensure the highest level of security for data transmitted over public networks?

  • Secure Shell (SSH) tunneling for individual services

  • VPN with Internet Protocol Security (IPSec)

  • VPN with Point-to-Point Tunneling Protocol (PPTP)

  • Remote Desktop Protocol (RDP) with Network Level Authentication (NLA)

Question 17 of 20

A security manager observes that the organization's IT environment and external threat-intelligence feeds have shown no significant changes during the past six months. Several executives propose skipping the annual tabletop exercise and document review for the incident response plan. Which of the following is the MOST compelling reason to proceed with the scheduled review and update?

  • Skipping the review conserves budget and staff time for higher-priority projects.

  • Regulatory and contractual obligations may require documented evidence of regular plan maintenance.

  • Because the environment is static, proactive changes are unnecessary until after a major breach takes place.

  • Regular reviews uncover otherwise hidden weaknesses and allow the plan to be improved before an actual incident occurs.

Question 18 of 20

You are a penetration tester for a network security consulting company. You are currently on-site at a customer's premises and are doing your first analysis of the customer's network security. You check if they are using Wifi and find that they are using a deprecated protocol with known vulnerabilities. Which of the options is most likely being used?

  • 805.99 b

  • WPA2

  • 802.1X

  • WEP

Question 19 of 20

A company wants to enhance its security by implementing an additional authentication factor to their current system that uses passwords. Which of the following would be the MOST secure biometric authentication method to add?

  • Installing key fob devices

  • Implementing fingerprint scanning

  • Using facial recognition technology

  • Setting up voice recognition systems

Question 20 of 20

A network administrator receives reports that users are unable to access the company’s internal file server. The administrator verifies that the server is operational and the network infrastructure is functional. What is the BEST mitigation technique to ensure the users regain access?

  • Patch the file server’s operating system and applications to the latest versions.

  • Review and adjust the access control list (ACL) for the file server.

  • Enhance real-time monitoring of network traffic to the file server.

  • Decommission the current file server and migrate to a new one.