00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

CompTIA Security+ SY0-701 (V7) Logo
  • Free CompTIA Security+ SY0-701 (V7) Practice Test

  • 20 Questions
  • Unlimited
  • General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

Which of the following is used to guide the secure setup of systems and applications by providing a collection of security configuration settings?

  • Vulnerability scans

  • Benchmarks

  • Automated reports

  • Security groups

Question 2 of 20

During a routine audit, your security team has discovered an unauthorized active directory tool being used by the marketing department to synchronize contact information across platforms. The team suspects that this is a case of Shadow IT. What is the PRIMARY risk associated with this discovery?

  • Decreased usage of IT-approved communication tools

  • Increased IT budget due to additional user licenses required for the unauthorized tool

  • Increased productivity and efficiency within the marketing department

  • Security breaches due to unauthorized applications bypassing organizational security processes

Question 3 of 20

Which of the following statements best characterizes symmetric encryption when compared with asymmetric encryption?

  • It is primarily used to generate digital signatures that verify data integrity and origin.

  • It removes the need for any secure key-exchange process between communicating parties.

  • It relies on two mathematically related keys, one public and one private, for all cryptographic operations.

  • It uses a single secret key that both the sender and receiver use to encrypt and decrypt data.

Question 4 of 20

A company is drafting its initial set of IT security documents. Among them, there is a need to establish a document that offers general advice and recommended practices for users to follow when dealing with company IT resources. Which type of security document should the company develop to fulfill this requirement?

  • Guidelines

  • Standards

  • Policies

  • Procedures

Question 5 of 20

An organization wants to detect unauthorized attempts to access their sensitive data. They decide to embed uniquely crafted bait elements within their data repositories that will trigger alerts when interacted with. Which of the following deception technologies would BEST achieve this objective?

  • Using honeytokens

  • Deploying a honeypot

  • Implementing honeyfiles

  • Setting up a honeynet

Question 6 of 20

A network administrator is hardening a new web server and must configure the firewall to allow secure web traffic. Which TCP port should the administrator open to allow HTTPS connections by default?

  • 443

  • 143

  • 3389

  • 80

Question 7 of 20

Which category of security controls involves managing day-to-day activities like incident response and change management?

  • Technical controls

  • Operational controls

  • Physical controls

  • Managerial controls

Question 8 of 20

What term best describes an attribute of a security architecture focused on continuing service delivery in the event of component failures or other issues?

  • Maintainability

  • Scalability

  • Responsiveness

  • Resilience

Question 9 of 20

Which type of disaster recovery site typically has infrastructure and utilities in place, but often requires additional configuration and data restoration before becoming operational?

  • Cold site

  • Hot site

  • Mobile site

  • Warm site

Question 10 of 20

Which action best exemplifies the mitigation of a security risk within an organization's risk management strategy?

  • Establishing additional access controls to safeguard sensitive information.

  • Purchasing an insurance policy to transfer the risk associated with potential data breaches.

  • Acknowledging the existence of a security risk and choosing not to take corrective actions.

  • Deciding to stop all activities that are associated with a high level of risk to avoid it completely.

Question 11 of 20

A security administrator is responsible for maintaining the integrity of software deployed in the company's server environment. They need to detect any unauthorized software modifications and ensure that only approved packages are running on the systems. Which solution should the administrator implement to meet these requirements?

  • Configuring systems to receive automatic software updates

  • Implementing a file integrity monitoring solution that automatically checks for changes to software packages

  • Maintaining a configuration management database that records installed software versions

  • Performing regular antivirus scanning on all servers

Question 12 of 20

An organization is concerned about unauthorized individuals entering its data center. Which of the following security measures would BEST prevent intruders from gaining physical access?

  • Implementing CCTV cameras to monitor the data center

  • Reviewing access logs for suspicious activity

  • Installing biometric access controls on the data center doors

  • Conducting regular security awareness training for employees

Question 13 of 20

Your employer has several thousand internal users all who need to access the internet on a daily basis to complete their work. What technology should be used to mask the internal IP addresses of these users and allow access to the internet through shared public IP addresses?

  • DMZ

  • Router

  • NAT

  • DNS

Question 14 of 20

A company must comply with the laws of the country where its data is physically located, regardless of the organization's country of origin.

  • False

  • True

Question 15 of 20

Which statement BEST describes the role of automated reports generated by a security information and event management (SIEM) system in day-to-day security operations?

  • They provide final, fully validated decisions that can be acted on immediately without further review.

  • They present aggregated security data but still require analyst review to validate context and determine the appropriate response.

  • They are generated directly by endpoint detection and response (EDR) tools rather than SIEM platforms.

  • They are useful only for meeting compliance reporting requirements and are not intended for operational security.

Question 16 of 20

A company issues smartphones to field sales staff who frequently travel between cities. Which connection method allows these devices to keep Internet and voice connectivity as they move, automatically handing communications from one base station to the next over large geographic areas?

  • Wi-Fi Direct

  • Near Field Communication (NFC)

  • Cellular network

  • Bluetooth

Question 17 of 20

A security administrator needs to deploy a network security device that will analyze and potentially block malicious traffic without being bypassed if it fails. Which deployment option aligns best with this requirement?

  • Deploy the device in inline mode with fail-closed configuration.

  • Use port mirroring to duplicate traffic to the device.

  • Implement the device as an external monitor that gets copied traffic from a network switch.

  • Set up the device as a network tap to passively monitor traffic.

Question 18 of 20

A security analyst is developing documentation to standardize the response process for common security incidents. This documentation will outline specific steps, actions, and decision points for handling events like phishing attacks and malware infections. Which of the following is being created?

  • An Acceptable Use Policy (AUP)

  • A Business Impact Analysis (BIA)

  • A playbook

  • A risk register

Question 19 of 20

What is a key activity performed as part of security monitoring to identify unauthorized actions within a network?

  • Deploying security patches

  • Reviewing security logs

  • Installing antivirus software

  • Modifying access control lists

Question 20 of 20

An organization plans to deploy a public-facing web application that is expected to receive heavy traffic. To guarantee that no single backend server becomes a bottleneck and to maintain high availability, which device should be placed in front of the server farm to distribute incoming client requests across multiple servers?

  • Intrusion detection system (IDS)

  • Proxy server

  • Load balancer

  • Firewall