00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

An organization needs to ensure that encrypted data remains accessible even if an employee's cryptographic credentials are lost or become unavailable. Which of the following methods BEST achieves this objective?

  • Applying key stretching techniques

  • Implementing key escrow

  • Issuing digital certificates

  • Utilizing certificate revocation lists

Question 2 of 15

A network administrator implements a security measure that filters all network traffic, blocking any connections from known malicious IP addresses to prevent unauthorized access to the internal network. Which type of security control is being described?

  • Deterrent

  • Detective

  • Preventive

  • Corrective

Question 3 of 15

A technology company is planning to outsource its customer data management to a third-party vendor. Before sharing any sensitive information, the company wants to ensure that the vendor is legally obligated to maintain the confidentiality of the data. Which document should the company require the vendor to sign?

  • NDA

  • MSA

  • MOU

  • SLA

Question 4 of 15

What process converts plaintext into a coded format to prevent unauthorized access?

  • Tokenization

  • Obfuscation

  • Hashing

  • Encryption

Question 5 of 15

An organization that handles top-secret defense research maintains a database server containing classified schematics. To comply with policy, the server must be completely unable to send or receive data over any wired or wireless network, thus preventing remote compromise or accidental data exfiltration. Which strategy best satisfies this requirement?

  • Enabling a host-based firewall

  • Implementing an air-gapped system

  • Using network segmentation with VLANs

  • Deploying an Intrusion Detection System (IDS)

Question 6 of 15

An organization has detected suspicious activity targeting their customer database. Which of the following threat actors is MOST likely pursuing financial gain through the exfiltration and subsequent sale of confidential customer information?

  • An unskilled attacker seeking recognition

  • Nation-state

  • Hacktivist

  • Organized crime

Question 7 of 15

A healthcare organization relies on a third-party service provider to manage its electronic health records (EHR) system. Recently, the service provider experienced a security breach, potentially exposing sensitive patient information. What type of vulnerability does this scenario best illustrate?

  • Zero-day

  • Insider Threat

  • Misconfiguration

  • Supply Chain

Question 8 of 15

As an IT manager, you have been tasked with reviewing the company's password policies to ensure they align with best practices for security. Upon examination, you find out that the policy requires all employees to change their passwords every 90 days. What change would you recommend to improve password security effectively while balancing user convenience?

  • Remove the password expiration policy and allow users to keep passwords indefinitely.

  • Mandate that all users create passwords with a minimum length of 30 characters.

  • Implement multi-factor authentication and increase password complexity requirements.

  • Shorten the password expiration period to require changes every 45 days.

Question 9 of 15

Which system is responsible for examining network traffic to identify undesirable activity and can actively intervene to prevent or block such activities?

  • A system that actively engages to interrupt or block potential security threats detected in network traffic.

  • A system that optimizes web traffic by caching frequently accessed resources for better performance.

  • A system dedicated to monitoring for compliance with data governance and regulatory standards.

  • A system that reinforces network architecture by enhancing data packet routing efficiency.

Question 10 of 15

Within the context of information security, which term is used to describe enforceable directives issued by a government entity that organizations are legally bound to follow?

  • Protocols

  • Mandates

  • Frameworks

  • Regulations

  • Guidelines

Question 11 of 15

A security manager wants to implement an approach that minimizes implicit trust and ensures every access request is fully authenticated, authorized, and encrypted before granting access to resources. Which of the following security models BEST meets these requirements?

  • Zero Trust Architecture

  • Security through Obscurity

  • Defense in Depth

  • Principle of Least Privilege

Question 12 of 15

A financial institution is implementing a policy that allows employees to use their personal smartphones for work-related tasks. The institution wants to ensure that company-specific information and configurations can be remotely removed from these smartphones when an employee terminates employment, while preserving the employee's personal data and apps. Which feature should the company look for in a software solution that allows for the central management of mobile devices?

  • Remote locking

  • Full wipe

  • Selective wipe

  • Encryption

Question 13 of 15

A company is planning to assess its network security by simulating an attack from malicious hackers. They aim to identify potential security gaps and vulnerabilities that could be exploited. What is the BEST type of penetration testing approach for this scenario?

  • Reconnaissance

  • Partially Known Environment Penetration Test

  • Unknown Environment Penetration Test

  • Known Environment Penetration Test

Question 14 of 15

In a recent audit of a secure facility, it was noted that the employee access system employs badges that are not programmed to confirm the identity of the badge reader before transmitting data. Which specific vulnerability are these badges most at risk of?

  • Social engineering tactics

  • Email compromise

  • Encryption breaking

  • Radio-Frequency Identification (RFID) cloning

Question 15 of 15

Which of the following attributes is MOST commonly associated with cyberattacks initiated by organized crime groups?

  • Primarily focuses on service disruption without financial motivations

  • Low technical capacity and limited financial backing

  • Acts based primarily on philosophical or political beliefs

  • High level of resources and sophisticated capabilities