⚡️ Pass with Confidence Sale - 40% off ALL packages! ⚡️

1 day, 9 hours remaining!
00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

In an effort to streamline client interaction processes, a business is transitioning to a sophisticated platform designed for this purpose. The analytics division requires permissions to generate reports and review client data, while the account management division needs the ability to engage with and alter client records. What is the BEST strategy for assigning the appropriate level of system access in accordance with each division's responsibilities?

  • Institute a policy where access is determined by the seniority of the personnel within the organization

  • Allow division heads to grant access as they see fit for their respective teams

  • Grant all divisions the same level of access to simplify management of the new platform

  • Utilize a predefined set of roles that are specific to user job functions to regulate access within the platform

Question 2 of 20

In the context of security control types, which of the following BEST describes the primary purpose of an Intrusion Detection System (IDS)?

  • Corrective control

  • Deterrent control

  • Preventive control

  • Detective control

Question 3 of 20

A financial institution needs to ensure continuous availability of its critical transaction processing system while maintaining data integrity and security. They require a solution that provides automatic failover and keeps data consistent across servers in case one server fails. Which of the following strategies should they implement to meet these requirements?

  • Deploy virtualization to run multiple virtual servers on one physical machine

  • Set up load balancing to distribute traffic across servers

  • Use network segmentation to isolate the transaction system

  • Implement server clustering with shared storage and replication

Question 4 of 20

A company has implemented a new policy requiring IT management to conduct security reviews of all vendors before onboarding them. The reviews need to ensure that the vendors are adhering to the same security standards as the company. Which of the following actions is MOST effective for assessing the vendors' adherence to these standards?

  • Reviewing the vendors' privacy policies.

  • Examining product data sheets for security features.

  • Conducting third-party security audits of the vendors.

  • Comparing the Service Level Agreements (SLAs) to the company's standards.

Question 5 of 20

A large enterprise with critical uptime requirements needs to implement a feature in their file system to help maintain a consistent state of their files post any system crashes. Which of the following would BEST ensure that file changes are systematically recorded, facilitating a quick restoration of the last known good state after a crash?

  • Utilizing RAID configurations for data redundancy

  • Enforcing strict file permissions

  • Implementing a file system with journaling capabilities

  • Relying on routine snapshots of the data

Question 6 of 20

During a post-implementation review, the security team notes that the new e-commerce platform must continue to meet performance and security requirements even if user traffic doubles over the next year. Which design characteristic best describes this requirement?

  • Durability

  • Scalability

  • Adaptability

  • Flexibility

Question 7 of 20

A C-level executive has contacted the security team and asked if you can verify the authenticity of an email. The email appears to have come from a bank saying their password has been compromised. The executive states they don't use this bank. After some investigation you find this email went out to around fifty percent of internal email addresses. Which term correctly describes this attack scenario?

  • Spear phishing

  • Trojan Horse

  • Phishing

  • Worm

  • Whaling

  • eVishing

Question 8 of 20

In a recent audit of a secure facility, it was noted that the employee access system employs badges that are not programmed to confirm the identity of the badge reader before transmitting data. Which specific vulnerability are these badges most at risk of?

  • Encryption breaking

  • Social engineering tactics

  • Radio-Frequency Identification (RFID) cloning

  • Email compromise

Question 9 of 20

An organization is experiencing incidents where employees receive emails that install malware when links are clicked. Which of the following would be the BEST method to mitigate this threat?

  • Educating users on how to identify and report phishing emails

  • Deploying anti-malware software on all devices

  • Enforcing strict password policies

  • Implementing email filtering to block malicious messages

Question 10 of 20

An organization needs to enforce consistent security settings across all Windows workstations. Which tool should the administrator use to centrally manage these settings?

  • Local security policies

  • Manual configuration of each workstation

  • Group Policy

  • Individual firewall settings

Question 11 of 20

When conducting a risk analysis, what is the term used to describe the probability that a given threat is capable of exploiting a particular vulnerability within an organization's security?

  • Vulnerability

  • Impact

  • Threat Level

  • Likelihood

Question 12 of 20

A company is enhancing its disaster recovery strategies to improve its ability to maintain continuity of operations after a catastrophic system failure. Considering the importance of being able to resume mission-critical activities swiftly and efficiently, which of the following options should be the company's MAIN focus?

  • Establishing a hot site to facilitate immediate failover

  • Implementing more frequent backups of all critical systems

  • Setting up a cold site with basic infrastructure and no pre-installed systems

  • Transitioning to a warm site that can be operational within a few days of an incident

Question 13 of 20

You have ordered a penetration test on the company's website from a third-party IT security consultant. Your web administration team has created a stand-alone test network to ensure the penetration test does not cause issues on the live website. Other than the IP address of the web server, you have not provided the penetration testers with any other information. What type of test best describes this scenario?

  • Integration

  • White-box

  • Stand-alone

  • Black-box

Question 14 of 20

An organization needs to ensure that encrypted data remains accessible even if an employee's cryptographic credentials are lost or become unavailable. Which of the following methods BEST achieves this objective?

  • Applying key stretching techniques

  • Implementing key escrow

  • Utilizing certificate revocation lists

  • Issuing digital certificates

Question 15 of 20

A healthcare organization relies on specialized equipment that operates on a legacy system which cannot be patched due to vendor abandonment. To maintain the highest level of security, what should be the organization's FIRST step in mitigating the risks associated with the inability to patch this system?

  • Applying antivirus software updates more frequently

  • Scheduling more frequent vulnerability scans

  • Network segmentation

  • Deploy an additional firewall specifically for the legacy system

Question 16 of 20

You are selecting a biometrics system for your company. You want to make sure you select a system that is going to be the most accurate choice. What calculation would you use to compare the different systems?

  • FRR

  • CER

  • Efficacy rates

  • FAR

Question 17 of 20

Which hardware-based security solution is specifically designed to securely generate, store, and manage cryptographic keys for a wide variety of applications?

  • Key Management System

  • TPM

  • HSM

  • Secure Enclave

Question 18 of 20

During disposal of storage media, due to regulatory requirements some of the data is required to be saved for a certain period of time. This is an example of what?

  • Data retention

  • Certification

  • Sanitization

  • Destruction

Question 19 of 20

Which of the following BEST describes the responsibility of an Owner in the context of data management and protection within an organization?

  • Designing and implementing the system's technical architecture that supports data processing requirements

  • Conducting periodic audits and reviews of access controls and security measures

  • Determining the classification of the data and the necessary controls for its protection

  • Executing routine tasks such as data backups and applying security patches to the data management systems

Question 20 of 20

When securing a wireless network, which of the following is important for preventing unauthorized access and ensuring that only authenticated users can connect?

  • Using WEP encryption

  • Enabling WPA3

  • Hiding the SSID

  • Implementing MAC filtering