⚡️ Pass with Confidence Sale - 40% off ALL packages! ⚡️

2 days, 9 hours remaining!
00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

During a routine update, an IT administrator accidentally overwrites crucial configuration files, causing incorrect data to be displayed to users. Which fundamental security principle is most impacted by this incident?

  • Availability

  • Authentication

  • Integrity

  • Confidentiality

Question 2 of 20

Which of the following BEST describes a decentralized security governance structure?

  • Lower-level departments have decision-making authority.

  • All security decisions are outsourced to a third-party vendor.

  • A single, rigid security policy is enforced across all departments.

  • Decisions are made exclusively at the executive level.

Question 3 of 20

A company is implementing a hybrid cloud solution, integrating on-premises infrastructure with cloud services. What should be the company's FIRST priority to ensure security consistency across both environments?

  • Establishing a responsibility matrix defining security obligations of the cloud provider and the client

  • Procuring cybersecurity insurance for potential breaches in the cloud environment

  • Ensuring all cloud services are running the latest version of their operating systems

  • Creating a common set of security policies for both on-premises and cloud environments

Question 4 of 20

Which of the following statements best describes the primary benefit of conducting static code analysis during the software development lifecycle?

  • It ensures that the source code adheres to the coding standards set by the organization to improve readability and maintenance.

  • It verifies that the code will compile without errors, ensuring that runtime environments are stable and less prone to crashes.

  • It identifies potential security vulnerabilities within the source code before the application is compiled or run, which can be addressed to prevent future exploits.

  • It automates the review process, thus enabling developers to focus solely on the implementation of new features rather than code security.

Question 5 of 20

A security administrator is working on updates to critical security policy documents and needs to ensure that any modifications are tracked to maintain accountability, as well as the ability to revert to previous versions if necessary. Which solution would BEST fulfill this requirement?

  • Increasing the frequency of file backups

  • Enforcing stricter permissions on the file server

  • Storing documents in a locked file cabinet

  • Implementing a version control system

Question 6 of 20

A security analyst is tasked with implementing a solution to receive timely data on emerging malware, malicious IP addresses, and known vulnerabilities. Which of the following would BEST fulfill this requirement?

  • A threat feed

  • A Security Information and Event Management (SIEM) system

  • A security baseline

  • A vulnerability scanner

Question 7 of 20

A network administrator notices that an employee is using a significant amount of internet bandwidth by streaming high-definition videos for personal entertainment during work hours. This activity is slowing down the network for other users who are performing business-critical tasks. Which of the following policies should the administrator consult to determine if this is a violation and what the appropriate response should be?

  • Change Management Policy

  • Incident Response Policy

  • Disaster Recovery Policy

  • Acceptable Use Policy (AUP)

Question 8 of 20

A company implements a mandatory security awareness training program for all employees to combat threats like phishing and social engineering. This type of training is an example of which security control type?

  • Technical

  • Preventive

  • Physical

  • Detective

Question 9 of 20

Which term best describes the ability of a system or component to be operational and accessible when required for use?

  • Load balancing

  • Failover

  • Scalability

  • High availability

Question 10 of 20

What term is used to describe the enhancement of a security team's effectiveness by employing tools and methods that allow fewer staff members to manage more resources?

  • Team augmentation

  • Workforce multiplier

  • Resource allocation

  • Staff scaling

Question 11 of 20

Which of the following best represents the role of endpoint protection software as a system hardening technique in an organization's cybersecurity strategy?

  • To provide comprehensive security measures, such as antivirus and personal firewall capabilities, to individual devices within a network

  • To manage user permissions and access control lists across the network

  • To optimize the performance and speed of endpoint devices for better user experience

  • To backup data periodically and ensure disaster recovery for individual endpoint devices

Question 12 of 20

What best describes the practice of giving users only the permissions they need to perform their work tasks?

  • The principle of least privilege

  • Permission auditing

  • Access all areas

  • Complete autonomy

Question 13 of 20

An organization determines that the cost of implementing controls to address a specific low-impact risk exceeds the potential loss, so management decides to do nothing further and simply budget for any possible consequences. Which risk response strategy is the organization employing?

  • Risk acceptance

  • Risk avoidance

  • Risk transference

  • Risk mitigation

Question 14 of 20

What is the primary function of a hashing algorithm within the realm of cybersecurity?

  • To generate a unique 'fingerprint' of data that can be used to verify its integrity

  • To compress data to save storage space before transmitting over a network

  • To encrypt data so that it can be securely transmitted over public networks

  • To serve as the public key within a public-private key pair used for asymmetric encryption

Question 15 of 20

A company's security team has recently upgraded the network firewall to a newer model to enhance security features. As a security analyst, what is the MOST important action to perform following the upgrade to ensure ongoing operational efficiency?

  • Schedule a meeting with the stakeholders to discuss the possibility of future upgrades.

  • Update the security policies and network configuration documentation to reflect changes made by the new firewall.

  • Implement additional firewall rules to immediately increase the security posture without a scheduled review.

  • Perform a complete network penetration test to identify potential new vulnerabilities introduced.

Question 16 of 20

Which type of digital certificate allows an organization to secure all subdomains of a domain with a single certificate?

  • Root certificate

  • Extended Validation certificate

  • Self-signed certificate

  • Wildcard certificate

Question 17 of 20

A security professional is assessing the network infrastructure of a company and discovers that wireless access points are broadcasting an open network without any form of encryption. What is the BEST action to improve the security posture regarding this finding?

  • Implementing an Intrusion Detection System (IDS) to monitor wireless traffic

  • Enabling WPA3 on all wireless access points

  • Decreasing the signal strength to limit the wireless range

  • Changing the Service Set Identifier (SSID) to a less common name

Question 18 of 20

Your company is launching a project to collaborate on cybersecurity research with a local university. The project's foundation is non-financial and aims to define the contribution of expertise and facilities from both parties. Which document best establishes the partnership without involving direct monetary transactions or detailed deliverables?

  • Collaborative terms outline

  • Contract

  • Memorandum of Agreement

  • Internally generated action plan

Question 19 of 20

What is the consequence of opting for expedient development and deployment measures that prioritize immediate functionality over long-term code maintainability and stability?

  • Technical debt

  • Code regression

  • Configuration drift

  • System entropy

Question 20 of 20

During an audit, inspectors discovered that maintenance personnel without the required security clearance were routinely allowed into a secure data center. Which security control should be strengthened to prevent this unauthorized entry?

  • Access controls

  • Security awareness training

  • Firewalls

  • Intrusion detection systems