00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

A security manager wants to implement an approach that minimizes implicit trust and ensures every access request is fully authenticated, authorized, and encrypted before granting access to resources. Which of the following security models BEST meets these requirements?

  • Security through Obscurity

  • Zero Trust Architecture

  • Principle of Least Privilege

  • Defense in Depth

Question 2 of 15

An organization has just deployed a new network infrastructure device and assigned a systems administrator to ensure it is secured. What is the BEST initial action the systems administrator should take to mitigate the risk of unauthorized access due to common credential attacks?

  • Change the default credentials immediately

  • Update the firmware to the latest version

  • Conduct a full vulnerability scan on the device

  • Enforce account lockout policies

Question 3 of 15

A financial institution is updating its information security program. Who should be designated as the risk owner for financial data breaches?

  • The Security Analyst

  • The IT Support Staff

  • The Data Owner

  • The Chief Information Officer (CIO)

Question 4 of 15

A software development company identifies that one of their third-party libraries has a known vulnerability that cannot be patched immediately. To continue operations without accepting the risk as it is, which strategy should they apply?

  • Mitigate

  • Accept

  • Avoid

  • Transfer

Question 5 of 15

A security manager is tasked with calculating the reliability of the organization's network infrastructure. Over the course of a single year, the total operational period was 8760 hours, during which the system encountered 5 unplanned outages. What is the Mean Time Between Failures (MTBF) for this network infrastructure based on the provided data?

  • 2190 hours

  • 1460 hours

  • 1752 hours

  • 1600 hours

Question 6 of 15

Which of the following best describes how an access control list (ACL) can be applied on a router interface to control packet flow?

  • It can be applied inbound and/or outbound on the same interface, allowing filtering of packets entering or leaving the interface according to defined rules.

  • It can only be applied in the inbound direction and filters traffic entering the router.

  • It can be applied in either direction, but once applied you cannot have both an inbound and an outbound ACL on the same interface.

  • It can only be applied in the outbound direction and filters traffic leaving the router.

Question 7 of 15

An organization is compromised after an external company that provides critical services is breached. This is an example of which type of supply chain vulnerability?

  • Software supplier vulnerability

  • Service provider vulnerability

  • Hardware supplier vulnerability

  • Cryptographic vulnerability

Question 8 of 15

Which statement about creating heat maps during a wireless site survey is TRUE?

  • Heat maps can only be created after access points are installed and on-site signal readings are taken.

  • Heat maps are produced automatically by the wireless controller only after clients connect to the network.

  • Predictive modeling can generate accurate heat maps before the physical environment is fully built.

  • Heat maps are necessary only for outdoor deployments, not for indoor wireless networks.

Question 9 of 15

A security administrator at a mid-size company is selecting an algorithm for secure email encryption that relies on a public/private key pair rather than a shared secret, to implement digital signatures as well. Which of the following algorithms satisfies this requirement?

  • RSA

  • Blowfish

  • RC4

  • AES

Question 10 of 15

A software development company wants to allow its users to log into a third-party code repository from their in-house development platform. The company aims to facilitate this without sharing user credentials with the third-party service. Which protocol is best suited to allow the company's platform to request access to the third-party service on behalf of the user?

  • Lightweight Directory Access Protocol (LDAP)

  • Open Authorization (OAuth)

  • Terminal Access Controller Access-Control System Plus (TACACS+)

  • Remote Authentication Dial-In User Service (RADIUS)

Question 11 of 15

During a routine vulnerability assessment of the network, an analyst receives a notification of potential malicious traffic that, upon further investigation, turns out to be legitimate and normal network activity. What does this notification exemplify?

  • A false negative

  • A true positive

  • An intrusion attempt

  • A false positive

Question 12 of 15

A large international corporation has been experiencing consistent network probing and has identified the attacker's origin as a well-funded organization with political motives, which leverages high-level expertise to avoid detection and attribution. What type of threat actor is most likely responsible for this activity?

  • Unskilled attacker

  • Hacktivist

  • Nation-state

  • Insider threat

Question 13 of 15

What improvements does a VLAN offer for network security?

  • Logically separates network segments

  • Physically restricts unauthorized devices from network access

  • Allows for session dropping in the event of an anomaly detection

  • Provides layer 4 filtering (TCP/UDP)

Question 14 of 15

What cryptographic technique involves adding random data to a message before hashing to make it more resistant to rainbow table attacks?

  • Salting

  • Digital signatures

  • Key stretching

  • Blockchain

Question 15 of 15

What category of data classification should be applied to information that is intended for general public disclosure and does not require any special handling or protection measures?

  • Sensitive

  • Restricted

  • Public

  • Confidential