00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

An organization is still using several workstations that run an operating system whose vendor ended support last year. Which of the following security concerns is MOST directly associated with continuing to operate this unsupported system?

  • User productivity will decrease because the OS lacks new usability features.

  • The system contains unpatched vulnerabilities that attackers can exploit.

  • The only impact is higher power and cooling costs due to outdated hardware.

  • The operating system will automatically disable network services when weaknesses are detected.

Question 2 of 15

You are the system administrator for your company. You notice that a large number of accounts have been locked out due to incorrect password entries. This is most likely an indicator of which type of malicious attack?

  • Keylogger

  • Brute force

  • Trojan

  • Ransomware

Question 3 of 15

Which of the following best describes controls that are designed to establish security policies, procedures, and guidelines?

  • Managerial Controls

  • Operational Controls

  • Physical Controls

  • Technical Controls

Question 4 of 15

A technology company is planning to outsource its customer data management to a third-party vendor. Before sharing any sensitive information, the company wants to ensure that the vendor is legally obligated to maintain the confidentiality of the data. Which document should the company require the vendor to sign?

  • SLA

  • MOU

  • NDA

  • MSA

Question 5 of 15

An organization wants to enhance server security by implementing a hardware device that can securely generate and manage cryptographic keys and offload cryptographic operations from the servers, thereby improving performance and security. Which of the following would BEST meet this requirement?

  • Hardware Security Module

  • Secure Enclave

  • Key Management System

  • TPM

Question 6 of 15

An organization implements a set of policies that outline employee responsibilities and expected behaviors regarding information security. What type of security control is this an example of?

  • Detective control

  • Preventive control

  • Corrective control

  • Directive control

Question 7 of 15

An organization requires immediate notification of unauthorized alterations to their financial system's executable files to maintain the integrity of its processing environment. Which implementation will best meet this requirement?

  • Schedule regular event log auditing to track user access and changes.

  • Enhance antivirus settings to perform hourly scans of financial data

  • Deploy a system that provides real-time alerts for modifications to sensitive files.

  • Configure an intrusion detection system to scan for network breaches.

Question 8 of 15

A former employee launches a cyber attack against their previous company, causing significant disruptions to operations. Which of the following motivations is most likely behind this attack?

  • Revenge

  • Financial gain

  • Philosophical beliefs

  • Espionage

Question 9 of 15

A company's security team is implementing various encryption strategies to protect the organization's data at rest. If they need to ensure the confidentiality of entire drives on employees' laptops which could be easily stolen or lost, which encryption method would be most appropriate?

  • Database encryption

  • File encryption

  • Partition encryption

  • Full-disk encryption

Question 10 of 15

As a security architect, you are evaluating the implementation of network appliances that should be primarily utilized for the identification of malfeasance occurring within the internal company network. In this scenario, which of the following solutions strategically placed within the network would best suit the continuous observation and timely reporting of anomalous activities without actively interfering with data flow?

  • Unified Threat Management

  • IDS

  • IPS

  • Jump Server

Question 11 of 15

Your organization requires a solution to monitor the health and security status of its endpoints. What kind of solution would you deploy to ensure centralized management and real-time alerting for potential security issues?

  • Set up a network analyzer to capture and inspect all traffic in and out of the network.

  • Regularly schedule manual security audits of all endpoints to check for software updates and configuration issues.

  • Deploy an agent-based monitoring tool on all endpoints that reports back to a central management console.

  • Use a centralized log management platform to passively analyze system logs.

Question 12 of 15

What type of attack involves an adversary intentionally causing a system to revert to a less secure state or protocol to exploit the vulnerabilities associated with it?

  • Phishing

  • Replay attack

  • Buffer overflow

  • Downgrade attack

Question 13 of 15

Which type of sensor is typically utilized to detect motion through emitted microwave signals that reflect off moving objects?

  • Infrared sensor

  • Microwave sensor

  • Pressure sensor

  • Ultrasonic sensor

Question 14 of 15

A cybersecurity firm discovers that a nation-state actor has been exploiting a previously unknown flaw in a popular web browser. The exploit allows the actor to gain remote control of targeted systems. The browser vendor was unaware of the flaw and has not yet developed a patch. What type of vulnerability is being exploited?

  • Zero-day vulnerability

  • Buffer overflow

  • SQL injection

  • Race condition

Question 15 of 15

A medium-sized financial institution is looking to improve its security operations. Among the numerous improvements, the institution's IT management team is evaluating how implementing automation and orchestration could be advantageous. Which of the following would be considered a primary benefit of incorporating automation and orchestration into their security operations?

  • It permits individual users to set their preferences for security settings on their own devices, enhancing user satisfaction.

  • They enable unlimited scaling of resources without any additional cost implications.

  • All event logs will be stored in a centralized repository without the need for a dedicated team to manage the storage solutions.

  • Automation and orchestration can enforce security baselines efficiently throughout the organization.