00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

A security analyst is reviewing authentication logs and notices a high volume of failed login attempts from a single IP address. The attempts target many different user accounts, but all use a small set of common passwords like 'Password123' and 'Winter2025'. This 'low-and-slow' method appears designed to avoid individual account lockouts. Which type of password attack does this activity indicate?

  • Dictionary attack

  • Plaintext/Unencrypted

  • Rainbow table

  • Spraying

Question 2 of 20

A network administrator is configuring remote access to the company's servers and wants to use a secure protocol. Which port should they select to align with standard secure practices?

  • Port 443

  • Port 22

  • Port 23

  • Port 80

Question 3 of 20

Which action best exemplifies the mitigation of a security risk within an organization's risk management strategy?

  • Establishing additional access controls to safeguard sensitive information.

  • Acknowledging the existence of a security risk and choosing not to take corrective actions.

  • Deciding to stop all activities that are associated with a high level of risk to avoid it completely.

  • Purchasing an insurance policy to transfer the risk associated with potential data breaches.

Question 4 of 20

During an incident response, an organization has identified an infected workstation that is part of a botnet and is communicating with external command and control servers. What is the BEST immediate action to contain this threat?

  • Isolate the infected workstation from the network

  • Perform a vulnerability scan to identify the infected workstation

  • Change access controls on the infected workstation

  • Capture network traffic to analyze the communication with the command and control servers

Question 5 of 20

Your company is expanding its operations to a new region with strict data protection laws that differ significantly from those where your headquarters is located. What is the most important first step your security governance team should take to ensure compliance with the new region's legal requirements?

  • Review and align the security policies with the local/regional legal requirements.

  • Apply the same security policies from the headquarters to the new region's operations without modification.

  • Mandate that all employees complete a new security awareness training immediately.

  • Implement an advanced encryption protocol to secure all data in transit and at rest within the new region.

Question 6 of 20

A financial services company discovers that an employee's computer has been transmitting sensitive client data to an external server. The IT team suspects malware is involved and has identified a process that seems to be masquerading as a valid application. Which type of malware is designed to perform unauthorized actions while disguising itself as legitimate software?

  • Trojan

  • Ransomware

  • Worm

  • Virus

Question 7 of 20

Which of the following is the most direct benefit of providing regular security awareness training to all employees in an organization?

  • It removes the need for technical security controls such as firewalls.

  • It completely prevents all forms of social engineering attacks without further action.

  • It increases employee compliance with corporate security policies and procedures.

  • It shifts all information-security responsibility to the IT department alone.

Question 8 of 20

During a post-implementation review, the security team notes that the new e-commerce platform must continue to meet performance and security requirements even if user traffic doubles over the next year. Which design characteristic best describes this requirement?

  • Adaptability

  • Durability

  • Flexibility

  • Scalability

Question 9 of 20

Which of the options below is typically advisory and not mandatory to adhere to?

  • Guideline

  • Procedure

  • Standard

  • Policy

Question 10 of 20

When establishing an effective security governance framework for an organization, which of the following is MOST essential to ensure alignment with business objectives and risk management strategies?

  • Information security policies

  • Recovery Point Objective (RPO) metrics

  • Annualized Rate of Occurrence (ARO) calculations

  • Password complexity standards

Question 11 of 20

An IT security manager wants to ensure that users can employ complex and unique passwords for each of their accounts without the need to remember each one individually. Which of the following solutions would best meet this requirement?

  • Implementing a password manager application

  • Enforcing strict password complexity and expiration policies

  • Deploying single sign-on authentication for all services

  • Implementing biometric authentication methods

Question 12 of 20

A security analyst is tasked with enhancing the organization's proactive defense capabilities by identifying new and evolving attack methodologies before they are widely used. Which of the following would be the MOST effective practice for this purpose?

  • Perform a comprehensive penetration test on an annual basis.

  • Conduct regular internal vulnerability scans on all network assets.

  • Subscribe to and analyze threat intelligence feeds.

  • Enforce a more stringent password complexity and rotation policy.

Question 13 of 20

A system administrator has been tasked with securing data at rest for a company's document storage server, ensuring maximum confidentiality. Which of the following solutions would be the MOST appropriate to accomplish this task?

  • Ensure Secure Socket Layer (SSL)/Transport Layer Security (TLS) is enabled on the server.

  • Implement full disk encryption on the document storage server drive.

  • Utilize a VPN with robust encryption for accessing documents remotely.

  • Encrypt each document individually with a unique key.

Question 14 of 20

A company's leadership has mandated the implementation of stronger controls around password management to improve security posture. As part of this initiative, the CISO is revising the company's password policy. Which of the following changes to the password policy BEST aligns with effective security governance practices?

  • Mandating biometric authentication in addition to the password for all user accounts.

  • Implementing a passphrase policy with a mix of upper and lower case letters, numbers, and symbols.

  • Increasing the mandatory password change frequency to every 30 days.

  • Disabling the account lockout feature after several incorrect password attempts.

Question 15 of 20

As a security administrator, you have implemented a new company policy to review firewall logs daily. During one review, you notice numerous login attempts from foreign IP addresses taking place outside of business hours. Based on this information, which of the following actions should be prioritized to enhance network security?

  • Update the firmware on the firewall to the latest version

  • Configure account lockout thresholds to prevent brute-force attacks

  • Conduct an additional security-awareness training session focusing on foreign cyber threats

  • Review the latest operating-system patches for all company servers

Question 16 of 20

Which of the following is an example of a possession factor that could be used for multi-factor authentication?

  • A password

  • Eye color

  • A mobile app authorization request

  • A hardware authentication token

Question 17 of 20

An organization utilizes virtualization to run multiple Virtual Machines on a single physical server for different departments. Recently, it was discovered that confidential data from one Virtual Machine was accessible to users on another Virtual Machine due to inadequate resource sanitization. Which of the following mitigates this virtualization vulnerability?

  • Disable hyper-threading on physical CPUs to prevent side-channel attacks

  • Install antivirus software on the host to detect malware within virtual machines

  • Sanitize resources when deallocating virtual machines

  • Isolate virtual machines in separate VLANs to prevent network sniffing

Question 18 of 20

Your company is in the process of expanding its operations into a new country. As the security architect, you are tasked with ensuring compliance with data handling regulations specific to the new location. Which of the following strategies should be your primary focus to maintain adherence to data sovereignty requirements concerning the storage and processing of customer data?

  • Regularly back up customer data to an offshore data center to ensure its availability.

  • Store and process all customer data within the same country where your customers reside.

  • Encrypt all customer data to ensure its confidentiality, regardless of its geographic location.

  • Institute robust access controls for all customer data irrespective of its storage location.

Question 19 of 20

Your employer has several thousand internal users all who need to access the internet on a daily basis to complete their work. What technology should be used to mask the internal IP addresses of these users and allow access to the internet through shared public IP addresses?

  • DMZ

  • DNS

  • NAT

  • Router

Question 20 of 20

An organization has implemented an aggressive patch-management program and deploys vendor updates within 24 hours of release. Which statement best describes the level of protection this practice provides against malware?

  • It completely eliminates the risk posed by all malware, including those that exploit zero-day vulnerabilities.

  • It significantly reduces exposure to malware that exploit known flaws, but additional controls are still needed to defend against zero-day and social-engineering attacks.

  • It automatically blocks malicious email attachments because the operating system files are up to date.

  • It makes endpoint detection and response (EDR) tools unnecessary because patched systems cannot execute malicious code.