00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

What term is used to describe a component within a system that, if it were to fail, would cause the entire system to cease functioning?

  • Limiting factor

  • Scalability

  • Documentation

  • Single point of failure

Question 2 of 15

During the analysis phase of an incident, an analyst is tasked with determining the scope of a suspected breach on several servers. Which data source will MOST likely provide the comprehensive information required to assess the activities on the affected servers?

  • Vulnerability scans

  • Operating system-specific security logs

  • Firewall logs

  • Packet captures

Question 3 of 15

What is the primary purpose of obtaining cybersecurity insurance as part of an organization's vulnerability response and remediation strategy?

  • To actively prevent cybersecurity incidents from occurring

  • To transfer the financial risks associated with cybersecurity incidents to another entity

  • To provide a technical defense against cyber-attacks

  • To serve as the primary method for detecting cyber threats in an organization

Question 4 of 15

As the security analyst for a financial institution, you uncover evidence of repeated access attempts on a user account during off-hours. Your investigation identifies that the attempts originate from a geographical location not sanctioned for any business operations. Which category of threat actor does this situation suggest is most likely involved?

  • A case of shadow IT where individuals within the organization are using unapproved external services

  • A threat actor external to the organization using targeted measures to compromise systems

  • An internal staff member attempting to access the network remotely with misconfigured settings

  • A novice individual testing their ability to infiltrate a network without malicious intent

Question 5 of 15

Which access control method combines elements such as user role, the resource being accessed, and the current time to make an access decision?

  • Role-based access control

  • Mandatory access control

  • Attribute-based access control

  • Discretionary access control

Question 6 of 15

What term is used to describe the enhancement of a security team's effectiveness by employing tools and methods that allow fewer staff members to manage more resources?

  • Team augmentation

  • Resource allocation

  • Staff scaling

  • Workforce multiplier

Question 7 of 15

An attacker is attempting to impersonate a trusted entity by presenting a fabricated network packet that appears to be part of an ongoing communication. Which kind of attack does this scenario best describe?

  • Phishing

  • Replay

  • Spoofing

  • Forgery

Question 8 of 15

Firewalls operating at which OSI layer can make policy decisions based on the actual content of messages-such as specific URLs or the payload contained inside HTTP requests-rather than only on IP addresses or port numbers?

  • Layer 3 (Network layer)

  • Layer 2 (Data link layer)

  • Layer 4 (Transport layer)

  • Layer 7 (Application layer)

Question 9 of 15

Which type of disaster recovery site typically has infrastructure and utilities in place, but often requires additional configuration and data restoration before becoming operational?

  • Cold site

  • Warm site

  • Hot site

  • Mobile site

Question 10 of 15

A security analyst is reviewing authentication logs and observes a high volume of failed login attempts originating from a single IP address. The attempts are distributed across hundreds of different user accounts, with only one or two password attempts per account before moving to the next. Which of the following security controls is specifically designed to frustrate this type of attack?

  • Password complexity policy

  • Multi-factor authentication (MFA)

  • Geofencing

  • Account lockout policy

Question 11 of 15

You want to limit company losses and downtime in the event of data loss, so you implement a data backup and recovery strategy. Which type of security control does this strategy represent?

  • Deterrent

  • Preventive

  • Corrective

  • Detective

Question 12 of 15

When managing operations across multiple countries, each with their own unique privacy and data handling laws, what is the BEST approach a company can adopt to ensure ongoing compliance in its handling of personal customer data?

  • Enhancing employee awareness through training programs

  • Adopting a comprehensive data inventory and retention policy

  • Establishing generic organizational policies for data handling

  • Regularly engaging with third-party auditors for compliance checks

Question 13 of 15

A security administrator is tasked with enhancing the security of the wireless network to which staff frequently connect their personal smartphones and tablets. What is the most effective method to protect the corporate resources in this scenario?

  • Deploy a quick-connect feature that allows devices to connect to the network with minimal user intervention.

  • Utilize a common shared key across all staff devices for wireless network encryption.

  • Provision a segregated network with stringent security policies tailored for personal devices.

  • Operate an unrestricted wireless connection to minimize the administrative overhead related to access management.

Question 14 of 15

During an authorized penetration test, you uncovered a server susceptible to an injection attack. To proceed according to best practices, what step should be taken before attempting to exploit this vulnerability?

  • Inform the organization's IT department about the vulnerability, requesting permission to exploit it.

  • Document the vulnerability in detail and continue testing other areas, leaving exploitation for the final phase.

  • Review the rules of engagement and testing scope to ensure that exploitation of the vulnerability does not exceed authorized activities.

  • Immediately exploit the vulnerability to determine the impact without altering any data on the server.

Question 15 of 15

A company is preparing to deploy a new web application onto its cloud infrastructure. The security team is tasked with implementing a deployment strategy that ensures the highest level of security while maintaining efficiency. Which of the following deployment strategies BEST meets this requirement?

  • Use a phased deployment approach, gradually increasing the number of users while monitoring for security issues

  • Implement automated deployment tools with pre-configured security checks integrated into the deployment pipeline

  • Conduct scheduled deployment during off-peak hours with subsequent manual security post-checks

  • Carry out manual deployment with step-by-step security verification performed by the IT security staff