00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

A company wants to limit access to its systems to users connecting from certain countries to comply with regional regulations. Which of the following methods would BEST achieve this?

  • Deploying endpoint security software

  • Enforcing strong authentication protocols

  • Implementing geolocation-based access controls

  • Utilizing encryption for all data in transit

Question 2 of 20

ABC Tech Corporation is considering outsourcing their customer support services to XYZ Support Inc. As part of the vetting process, which of the following is the most appropriate action to ensure due diligence and care is exercised in selecting a third-party vendor?

  • Review the marketing materials of XYZ Support Inc. for their success stories and client testimonials

  • Conduct an in-depth background check on XYZ Support Inc., which includes financial, reputational, and performance aspects

  • Delegate the decision to an intern, assuming that third-party vendors have similar capabilities

  • Choose XYZ Support Inc. because they offered the lowest bid, thereby saving on costs

Question 3 of 20

An attacker infiltrates a company's network and steals customer credit card information. What is the likely motivation behind this attack?

  • Financial gain

  • Data exfiltration

  • Revenge

  • Espionage

Question 4 of 20

You are working as a cybersecurity analyst for a 3rd party contractor. You have been brought in by an organization who believes they were hacked by a malicious actor. Their internal security team has hired you to determine the impact of the unauthorized access. At the time of the intrusion there were 5 servers online: DEV_APP_001, PRD_APP_002, PRD_DB_008, STG_DB_004 and FINANCE_009. What step should you take to begin the analysis?

  • Create a snapshot backup and then reformat each server

  • Begin hardening all servers immediately before the impact analysis starts

  • Create a new server running Kali Linux and make necessary firewall changes to allow it to access all the listed servers

  • Begin analyzing each server after prioritizing them based on the data stored on each server

Question 5 of 20

Which state describes information that is being processed by an application?

  • Data at rest

  • Encrypted data

  • Data in use

  • Data in transit

Question 6 of 20

An organization is designing a high-availability web application that must handle fluctuating workloads and ensure minimal downtime during peak usage. Which of the following strategies BEST addresses the compute considerations for achieving high availability in this scenario?

  • Utilizing real-time data replication to a standby server

  • Implementing load balancing to distribute traffic across multiple servers

  • Deploying redundant power supplies for each server

  • Scheduling regular maintenance during off-peak hours

Question 7 of 20

A security manager has placed conspicuous warning signs around the perimeter of a data center. The signs state, "No Trespassing - Violators Will Be Prosecuted." What type of security control does this action represent?

  • Deterrent

  • Compensating

  • Corrective

  • Preventive

Question 8 of 20

A company's change management procedure requires that any modifications to the IT infrastructure undergo a review process. Before final approval, which document should primarily guide the decision on whether the change is in line with organizational security policies and standards?

  • Acceptable Use Policy (AUP)

  • Information Security Policies

  • Software Development Lifecycle (SDLC) document

  • Business Continuity Plan (BCP)

Question 9 of 20

Your organization is handling sensitive government contracts and must ensure that information related to these projects is guarded against unauthorized physical access. In accordance with data classification policies, which of the following is the BEST way to handle such data?

  • Institute policies for secure disposal of printouts and storage media containing the data

  • Enable detailed logging of all access to the data for audit purposes

  • Encrypt all data and frequently change encryption keys

  • Store the data in a physically secure location and enforce strict access controls

Question 10 of 20

Firewalls operating at which OSI layer can make policy decisions based on the actual content of messages-such as specific URLs or the payload contained inside HTTP requests-rather than only on IP addresses or port numbers?

  • Layer 2 (Data link layer)

  • Layer 7 (Application layer)

  • Layer 4 (Transport layer)

  • Layer 3 (Network layer)

Question 11 of 20

A company is revising its security monitoring strategies to enhance incident detection and response. Their current system is primarily manual, resulting in delayed identification and inconsistent reporting of suspicious activities. Which of the following is the BEST method to improve their incident reporting and monitoring process?

  • Expanding the in-house security team

  • Implementing real-time automated monitoring and alerting systems

  • Increasing the frequency of manual security audits

  • Conducting more comprehensive employee training sessions

Question 12 of 20

An IT administrator is tasked with handling the offboarding process for an employee who has just been terminated. To minimize security risks, which of the following actions should be the administrator's IMMEDIATE priority?

  • Begin archiving the data from the employee's workstation.

  • Notify the rest of the team about the employee's departure.

  • Disable the employee's user accounts across all systems.

  • Retrieve all company-owned physical assets from the employee.

Question 13 of 20

In a highly secure network environment with strict throughput requirements, which device attribute would MOST likely be preferred when implementing a security control intended to scrutinize traffic without causing significant latency?

  • An active security device configured to make real-time decisions

  • A security device configured to fail-open to reduce latency

  • A tap/monitor setup that passively observes traffic

  • An inline security device configured to interact with traffic

Question 14 of 20

An organization's web server configuration has been altered without authorization, leading to a security breach. The security team decides to implement a system that tracks all changes to the configuration files, maintains a history of these changes, and allows them to revert to any previous version if necessary. Which of the following solutions will BEST meet these requirements?

  • Use file integrity monitoring tools on configuration files

  • Schedule regular backups of configuration files

  • Apply strict access controls to configuration files

  • Implement a version control system for configuration files

Question 15 of 20

Which risk management strategy is the only one that will completely eliminate the risk associated with an activity?

  • Mitigation

  • Transference

  • Acceptance

  • Avoidance

Question 16 of 20

Within a secure data center, engineers have enclosed an entire row of server racks inside a conductive mesh that blocks both incoming and outgoing electromagnetic fields. What is the primary security purpose of deploying this enclosure?

  • Physically deter intruders by acting as a hardened barrier that delays forced entry

  • Prevent electromagnetic eavesdropping and data leakage by blocking emissions

  • Provide redundant environmental controls such as precise humidity and temperature regulation

  • Detect unauthorized access attempts by monitoring ambient radio-frequency signals

Question 17 of 20

Which of the following best describes the concept of high availability in the context of security architecture?

  • Designing systems in a way that reduces their energy consumption to ensure longer operating times

  • Ensuring operational performance for a higher than normal period by means of redundancy and failover mechanisms

  • The ability of a system to handle increased loads by distributing tasks across multiple servers

  • The duplication of critical components of a system with the intention of increasing reliability of the system

Question 18 of 20

A security analyst needs to investigate a potential data breach that is suspected to have occurred over the past week. The investigation requires correlating log data from firewalls, servers, and intrusion detection systems to identify suspicious patterns and trace the timeline of events. Which of the following tools is BEST suited for this type of historical analysis and data correlation?

  • A packet capture utility

  • A system vulnerability scanner

  • A real-time network performance monitor

  • A security operations dashboard

Question 19 of 20

A security analyst notices a series of requests on a company's web server logs. Each request tries to retrieve different paths that are not commonly accessed, and all the requests come from one external network address within a brief time window. Which of the following best describes the intent of these requests?

  • A misconfigured automatic task on the server

  • Execution of client-side scripts from a user's web browser

  • Reconnaissance by an attacker attempting to discover unlinked content or vulnerabilities

  • A user navigating the company's public website pages

Question 20 of 20

During a security awareness training session, you want to ensure employees are equipped to identify fraudulent emails attempting to obtain sensitive company data by impersonating a trusted source. Which type of security threat should the training primarily focus on?

  • Tailgating

  • Vishing

  • Spear phishing

  • Phishing campaigns