00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

Which type of security control is primarily used to identify unauthorized access or activities on a network?

  • Intrusion Detection System (IDS)

  • Security Policies

  • Firewalls

  • Backup Systems

Question 2 of 20

When configuring a security device, which mode will allow traffic to pass through if the device fails to process the traffic normally?

  • Fail-closed

  • Fail-secure

  • Fail-open

  • Failover

Question 3 of 20

When allowing internal clients to browse external web sites, an administrator creates an outbound rule on a stateful firewall permitting TCP traffic to destination port 80. Which of the following best describes what must be configured to allow the return traffic from the web servers?

  • Open an inbound rule for the client's ephemeral port range to permit the returning packets.

  • Create a matching inbound rule on TCP port 80 so that responses from the web server are permitted.

  • An inbound rule is only required if the connection uses UDP instead of TCP.

  • No additional inbound rule is required; the firewall tracks the session and automatically allows the return traffic.

Question 4 of 20

A merged entity is facing a challenge integrating its central authentication service, based on a well-established directory protocol, with a newly acquired company's applications that authorize users through a popular web-based authorization standard. To achieve a cohesive authentication process across both existing and newly included systems, what is the appropriate solution to adopt?

  • Amend password management policies to standardize user credentials across all systems and applications.

  • Enforce strict two-factor authentication for users of both systems to enhance overall security posture.

  • Employ a federation service to bridge the two distinct user authentication systems for seamless operation.

  • Establish an encrypted channel between the two systems to securely map user accounts from one to the other.

Question 5 of 20

A company is rolling out a new software update that will significantly change its online purchasing system. Which of the following is the BEST approach to ensure that the update does not adversely affect the security posture of the organization?

  • Update all system diagrams to reflect the new software changes.

  • Schedule the update during a maintenance window to reduce downtime.

  • Review and approve the software update through the proper channels.

  • Conduct a thorough impact analysis prior to deployment.

Question 6 of 20

An organization is reviewing its security policies to better protect against unauthorized access to employee accounts. Which of the following would be the BEST mitigation strategy to prevent a brute force attack on user passwords?

  • Disabling unused accounts

  • Enabling account lockouts after a specified number of failed login attempts

  • Implementing strong password policies that require complex passwords

  • Monitoring for unauthorized access attempts on user accounts

Question 7 of 20

Which process is used to identify the difference between the current security measures and the desired state of security within an organization?

  • Threat Modeling

  • Business Impact Analysis

  • Gap Analysis

  • Risk Assessment

Question 8 of 20

An organization that handles top-secret defense research maintains a database server containing classified schematics. To comply with policy, the server must be completely unable to send or receive data over any wired or wireless network, thus preventing remote compromise or accidental data exfiltration. Which strategy best satisfies this requirement?

  • Implementing an air-gapped system

  • Enabling a host-based firewall

  • Using network segmentation with VLANs

  • Deploying an Intrusion Detection System (IDS)

Question 9 of 20

What is the term for the technology that allows mobile devices to access the Internet and exchange data while moving across regions and being handed off between cell towers within a cellular network?

  • Cellular network

  • Wi-Fi Direct

  • Near Field Communication (NFC)

  • Bluetooth

Question 10 of 20

An IT staff member is tasked with the day-to-day management of information assets, including implementing backup and recovery procedures and maintaining security controls, but does not have authority to make policy decisions regarding the data. What role does this staff member hold in the organization?

  • Data Custodian

  • Data Owner

  • Data Processor

  • Data Controller

Question 11 of 20

A cybersecurity analyst is tasked with selecting an appropriate tool for scanning the security posture of the organization’s network infrastructure. The emphasis is on identifying misconfigurations and unpatched systems. Which of the following tools should the analyst choose for the BEST results?

  • Network sniffer

  • Protocol analyzer

  • Antivirus software

  • Vulnerability scanner

Question 12 of 20

A company plans to revamp its network infrastructure to enhance the ability to centrally manage network traffic and resources while also dynamically adapting to changing business needs. Which networking approach should the company implement to gain control over traffic flow and allow for the rapid provisioning of network services?

  • Content delivery network

  • Network function virtualization

  • Traditional network model with static configurations

  • Software-defined networking

Question 13 of 20

What is the primary security benefit provided by implementing segmentation within a network infrastructure?

  • It reduces the attack surface within the network.

  • It increases the scalability of the network infrastructure.

  • It primarily prevents data leakage between departments.

  • It enhances data encryption across the entire network.

Question 14 of 20

A financial services company has historically maintained a very conservative security posture, prioritizing stability over innovation. Recently, executive leadership decided to launch a new fintech platform to attract a younger demographic. This new venture uses cutting-edge technologies that are considered higher risk. This strategic shift will MOST likely require a direct reassessment of which of the following?

  • Risk tolerance

  • Acceptable Use Policy (AUP)

  • Recovery Point Objective (RPO)

  • Annualized Rate of Occurrence (ARO)

Question 15 of 20

A medium-sized healthcare organization has performed a risk analysis and discovered that the potential financial impact of breaches to patient data is very high. The organization has a limited budget and cannot implement all the recommended security controls. The Chief Information Security Officer (CISO) must decide which risks to prioritize. Which risk management strategy should the CISO adopt for those risks that cannot be fully mitigated due to budget constraints?

  • Mitigate the risks by implementing all recommended security controls despite the budget.

  • Avoid the risks by ceasing all operations that involve handling patient data.

  • Accept the risks and document the decision and the rationale behind it.

  • Transfer the risks to a cyber insurance company.

Question 16 of 20

A government agency requires the setup of an ultra-secure communication system for handling top-secret information. Which of the following represents the most appropriate approach to achieve the maximum level of security through physical isolation?

  • Setting up the system on a completely air-gapped network.

  • Creating multiple VLANs to segregate top-secret communication from other data traffic.

  • Using dedicated cabling to connect systems while still being part of the internet.

  • Installing a high-end firewall with strict access control lists.

Question 17 of 20

An attacker infiltrates a company's network and steals customer credit card information. What is the likely motivation behind this attack?

  • Espionage

  • Revenge

  • Financial gain

  • Data exfiltration

Question 18 of 20

A company has a policy to repurpose its storage devices internally before considering disposal. When preparing storage devices that were used for sensitive projects for repurposing within a less critical department, which measure should be employed to minimize the risk of data exposure?

  • Degauss the drives to disrupt the magnetic field and render the data unreadable.

  • Conduct a secure erasure conforming to a stipulated industry standard for data sanitization.

  • Perform a standard antivirus scan to ensure the absence of malware.

  • Reformat the drives using the quick format option to prepare for immediate reuse.

Question 19 of 20

A system administrator needs to ensure that known security vulnerabilities in their software can be addressed promptly using solutions provided by the vendor. Which consideration is most relevant in this scenario?

  • Patch availability

  • Resilience

  • Compute capacity

  • Ease of recovery

Question 20 of 20

Which of the following is an example of a factor that would be categorized under 'something you are' when implementing multifactor authentication?

  • Smart card in possession of the user

  • Password known only to the user

  • Retinal scan

  • Digital certificate installed on a smartphone