00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

Which of the following scenarios best describes an attack that is likely to cause abnormal consumption of system resources, potentially leading to a system outage?

  • Phishing attack that deceives a user into sharing their password

  • Email spam campaign distributing unsolicited messages

  • DDoS attack

  • Social engineering attack that tricks an employee into wiring money

Question 2 of 15

A company's network was infiltrated by an attacker who used sophisticated techniques to bypass advanced security measures. The attacker was well-funded and had advanced capabilities. Sensitive data was exfiltrated over an extended period without detection. Which type of threat actor is most likely responsible for this attack?

  • Hacktivist

  • Unskilled Attacker

  • Insider Threat

  • Nation-State Actor

Question 3 of 15

A company is planning to integrate their authentication processes with a third-party service provider to allow employees to use a single set of credentials across both systems. To enhance the user experience and provide secure access to the services offered by the partner, which solution would be the BEST to implement?

  • Using a central access policy service to manage application access across entities

  • Implementing a federated identity management system

  • Adopting a web authentication standard

  • Creating additional user credentials for each employee within the third-party service provider's system

Question 4 of 15

Of the following options, which is a cryptographic algorithm classified as asymmetric?

  • DES

  • Blowfish

  • RSA

  • RC4

  • RC5

  • AES

Question 5 of 15

A company is assessing various options to enhance the security of their facility and data center. Which of the following would serve as the best deterrent control to discourage trespassers from entering the secured premises of the data center?

  • Erecting security awareness posters regarding tailgating in employee areas

  • Deploying mantraps at the primary entrance to the data center

  • Implementing badge readers at all points of entrance and exit

  • Installing highly visible security cameras around the perimeter and entry points

Question 6 of 15

In a scenario where a regional healthcare provider is implementing a strategy to segregate its administrative, clinical, and guest networks to both minimize its attack surface and comply with health information privacy regulations, which technology should be utilized to not only separate the segments but also enforce distinct security policies and control inter-segment traffic?

  • Border Gateway Protocol (BGP) for routing control

  • Transport Layer Security (TLS) for secure communications

  • Quality of Service (QoS) configuration for traffic prioritization

  • Next-generation firewall (NGFW)

Question 7 of 15

A security analyst is tasked with implementing a solution to receive timely data on emerging malware, malicious IP addresses, and known vulnerabilities. Which of the following would BEST fulfill this requirement?

  • A vulnerability scanner

  • A security baseline

  • A Security Information and Event Management (SIEM) system

  • A threat feed

Question 8 of 15

The security team at a multinational corporation has been alerted to a potential vulnerability that affects multiple operating systems. This vulnerability allows remote attackers to execute arbitrary code on affected systems. To address this concern swiftly, the team must reference a categorized list of known vulnerabilities. Which resource should they use to find the detailed information about this vulnerability?

  • Internet Engineering Task Force (IETF)

  • Open Web Application Security Project (OWASP)

  • CERT Coordination Center

  • National Vulnerability Database (NVD)

Question 9 of 15

A lazy programmer at a startup was recently fired for sleeping at their cubicle. Angry about being fired and wanting revenge, the programmer accessed the admin panel of the startup's website using a method they had previously programmed into the application before being dismissed. With access to the admin panel, the former employee was able to delete user accounts from the database, causing significant issues for the company. Which of the following options best describes the methodology of the attack?

  • Ransomware

  • SQL injection

  • Backdoor

  • Rootkit

Question 10 of 15

Which type of penetration test involves combining both offensive and defensive techniques to thoroughly assess an organization's security posture?

  • Integrated Penetration Testing

  • Defensive Penetration Testing

  • Offensive Penetration Testing

  • Physical Penetration Testing

Question 11 of 15

Which of the following best describes the primary purpose of corrective controls in a security context?

  • To identify and detect security incidents as they happen

  • To substitute for primary security controls when they are not available

  • To limit the damage and impact after a security incident has occurred

  • To prevent security incidents from occurring in the first place

Question 12 of 15

A multinational corporation has shifted its workforce to a primarily remote model and migrated most of its business applications to various cloud providers. The Chief Information Security Officer (CISO) is concerned about the high latency and security gaps created by backhauling all user traffic to a central on-premises data center for inspection. The goal is to provide users with direct, secure, and high-performance access to cloud resources regardless of their location.

Which of the following solutions BEST addresses the company's requirements?

  • Using a Cloud Access Security Broker (CASB) to monitor all cloud traffic.

  • Implementing a traditional VPN concentrator at the main data center.

  • Hardening the on-premises firewalls and increasing internet bandwidth.

  • Deploying a Secure Access Service Edge (SASE) architecture.

Question 13 of 15

Your company has recently rolled out a new security awareness training program focused on recognizing social engineering attacks. To ensure the effectiveness of the training, what is the MOST effective method to evaluate employee understanding and application of the training content?

  • Including a quiz at the end of the training session

  • Publishing a quarterly newsletter highlighting social engineering threats

  • Conducting unannounced phishing simulation campaigns

  • Unannounced network scans after training completion

Question 14 of 15

The IT Security team of a financial institution is implementing a new system that should ensure that access permissions to sensitive financial records align strictly with employee job functions. Compliance requirements dictate that every access permission must be auditable and cannot be based on individual discretion. Which authorization model best suits the security and compliance requirements of this scenario?

  • Discretionary Access Control (DAC)

  • Attribute-Based Access Control (ABAC)

  • Role-Based Access Control (RBAC)

  • Security Support Provider Interface (SSPI)

Question 15 of 15

A security analyst implements intrusion detection sensors and automated log analysis tools. The primary purpose of these tools is to identify anomalies or disruptions in network traffic and system activities and then trigger an alert. Which type of security control does this implementation represent?

  • Corrective

  • Deterrent

  • Detective

  • Preventive