00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

Which of the following options represents a common practice in the hardening of computing systems to enhance security?

  • Disabling the firewall on all servers

  • Allowing unrestricted root access to all users for convenience

  • Using vendor-supplied default passwords for all devices

  • Updating systems regularly

Question 2 of 20

Which containment technique would be the best response when a system is believed to be infected with malware?

  • Isolate the affected systems

  • Determine the attack vector and disable it

  • Immediately segment the network into the smallest possible groups

  • Propagation

Question 3 of 20

An organization allows users to grant access permissions to their own files, enabling other users to read or modify these files based on the owner's decision. Which access control model does this scenario best illustrate?

  • Mandatory Access Control (MAC)

  • Discretionary Access Control (DAC)

  • Attribute-Based Access Control (ABAC)

  • Role-Based Access Control (RBAC)

Question 4 of 20

Your organization is rolling out a new line of laptops to employees who handle sensitive data. These devices will be storing encryption keys, digital certificates, and passwords. The IT department is required to ensure that the keys used for disk encryption are stored in a way that is resistant to tampering and can provide platform integrity verification. What embedded solution on the laptops should be utilized to achieve this level of security?

  • Implement a Secure Enclave within the laptop's central processing unit.

  • Integrate a separate Hardware Security Module (HSM) for each laptop.

  • Use the Trusted Platform Module (TPM) on the laptops.

  • Apply a Key Management System for all user credentials.

Question 5 of 20

Which form of access control is specifically designed to adapt in real-time to the perceived threat level, improving the security stance by continuously evaluating the risk and context associated with user access requests?

  • Adaptive Policy-driven access control

  • Role-based access control (RBAC)

  • Discretionary access control (DAC)

  • Mandatory access control (MAC)

Question 6 of 20

A multinational corporation with operations in several countries is working to ensure compliance with global data protection regulations. What is the most appropriate action for the company to take in order to maintain compliance with the diverse set of regulations concerning user data privacy?

  • Create a data retention policy that focuses on adhering to the least restrictive data protection standards to ensure ease of data flow.

  • Set up an external compliance team dedicated to each region to handle region-specific data privacy laws.

  • Establish a data governance framework that complies with the highest standard among the international data protection regulations.

  • Delegate the responsibility for compliance with data protection laws to the IT department of each local office.

Question 7 of 20

A company has been monitoring the performance of its network routers over a 2-year period and observed the following outages: Year 1 experienced 4 outages, totaling 16 hours, and Year 2 experienced 2 outages, totaling 12 hours. Assuming the network was operational for a total of 17,520 hours across both years, what is the Mean Time Between Failures (MTBF) for the network routers?

  • 2,920 hours

  • 2,500 hours

  • 3,004 hours

  • 2,752 hours

Question 8 of 20

A company wants to reduce the number of login IDs and passwords their employees need to remember to access various company resources. Which authentication scheme should a security administrator recommend to achieve this?

  • SSO

  • 802.1X

  • RADIUS

  • TACACS+

Question 9 of 20

A medium-sized healthcare organization has performed a risk analysis and discovered that the potential financial impact of breaches to patient data is very high. The organization has a limited budget and cannot implement all the recommended security controls. The Chief Information Security Officer (CISO) must decide which risks to prioritize. Which risk management strategy should the CISO adopt for those risks that cannot be fully mitigated due to budget constraints?

  • Mitigate the risks by implementing all recommended security controls despite the budget.

  • Transfer the risks to a cyber insurance company.

  • Avoid the risks by ceasing all operations that involve handling patient data.

  • Accept the risks and document the decision and the rationale behind it.

Question 10 of 20

An organization wants to implement a system where users authenticate once and gain access to multiple related systems without re-entering credentials. What authentication method should they deploy?

  • Single Sign-On

  • Federated Identity Management

  • Biometric Authentication

  • Multifactor Authentication

Question 11 of 20

A security administrator is tasked with ensuring that all servers in the organization adhere to a standardized and secure configuration as determined by the organization's security team. Which of the following should the administrator implement to achieve this objective most effectively?

  • Enforcing strict password policies

  • Using intrusion detection systems (IDS)

  • Deploying a security content automation protocol (SCAP) tool

  • Applying configuration management benchmarks

Question 12 of 20

Which device specializes in the secure generation, storage, and management of encryption keys?

  • Hardware appliance for encryption key stewardship

  • Processor security feature for sensitive data protection

  • Network Attached Storage

  • Biometric Reader

Question 13 of 20

A company is drafting a security policy for its BYOD program. The draft states that employees' personal mobile devices must be secured using only the device's built-in biometric authentication, such as a fingerprint or face scan. A security analyst is asked to review the policy. Which of the following is the BEST reason for the analyst to recommend against this policy?

  • Biometric authentication is a single factor that can be bypassed or spoofed, leaving the device vulnerable.

  • Relying on biometrics leads to high battery consumption on mobile devices.

  • Biometric authentication is not supported by most mobile device management (MDM) platforms.

  • Users often find biometric authentication less convenient than a traditional password.

Question 14 of 20

As the lead security analyst at a financial institution, you have been tasked with evaluating the effectiveness of the implemented security controls. During the audit, you need to verify that access control policies are correctly enforced and that there are no deviations from the standard configurations across all servers. Which of the following audit practices would be the MOST effective for this purpose?

  • Conducting a configuration audit

  • Executing a financial audit

  • Performing a performance audit

  • Undertaking an operational audit

Question 15 of 20

Which of the following best describes why an organization must be aware of local and regional regulations when developing their security program?

  • To apply universal standards of cybersecurity that are recognized globally.

  • To simplify the security program management by adhering to broader compliance laws.

  • To avoid the need for customizing security measures for different company branches.

  • To ensure compliance with specific legal requirements that may not be covered by national or global standards.

Question 16 of 20

An organization needs to ensure that its most critical systems are protected from external network threats and unauthorized access. Which of the following methods provides the MOST secure way to achieve this level of isolation?

  • Implement an air-gapped network for these systems

  • Install a firewall to filter traffic between these systems and other networks

  • Employ network address translation (NAT) for these devices

  • Use a VLAN to segment these systems from the corporate network

Question 17 of 20

During a post-incident review meeting, a security analyst is tasked with improving the incident response process based on recent events. Which of the following actions would BEST ensure a positive impact on future incident response capabilities?

  • Revising all security training materials without assessing their relevance to the incident.

  • Conducting a review of historical incident trends without making changes to existing procedures.

  • Updating the Incident Response Plan with specific improvements identified from the incident.

  • Deciding that the existing Incident Response Plan is sufficient since the incident was eventually contained.

Question 18 of 20

Which of the following best describes the process of sanitization in asset disposal?

  • Physically destroying a storage device to prevent it from being repurposed.

  • Compressing files on a storage device to save space before disposal.

  • Removing all data from a storage device to prevent data retrieval when it is disposed of or repurposed.

  • Encrypting the contents of a storage device as part of the disposal process.

Question 19 of 20

A company's server room is equipped with motion sensors that alert security personnel when movement is detected after hours. What type of control are the motion sensors?

  • Preventive Control

  • Deterrent Control

  • Detective Control

  • Corrective Control

Question 20 of 20

An organization needs a backup facility that can quickly take over full operations with minimal downtime in the event of a disaster. Which type of site should they implement?

  • Hot site

  • Cold site

  • Warm site

  • Reciprocal site