00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 20
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

Implementing compensating controls post-scan can effectively diminish the necessity for rescanning a system after initial vulnerability identification.

  • False

  • True

Question 2 of 20

An organization's security policy mandates that any implemented security solutions must not interfere with network traffic or introduce potential points of failure, but the company still wants to be alerted to any suspicious activities on the network. Which of the following would BEST achieve this goal?

  • Deploying a firewall with deep packet inspection

  • Installing an Intrusion Prevention System

  • Implementing an Intrusion Detection System

  • Using a Content Filter

Question 3 of 20

An IT security manager has noticed a recent uptick in confidential information being leaked through casual conversations on the company's authorized instant messaging (IM) platform. While reviewing the IM security policies, what should the manager implement to reduce the risk of data leakage through IM chats?

  • Configure Data Loss Prevention (DLP) policies on the IM system

  • Restrict file permissions for users on the network

  • Enforce end-to-end encryption for all IM communications

  • Assign dedicated staff to manually review IM message logs for sensitive data

Question 4 of 20

What does the term 'complexity' relate to in the context of security operations?

  • The difficulty level of an attacker required to exploit a system

  • The number of users that have access to a system

  • The extent to which systems, processes, and technologies are interconnected and intricate, potentially making them harder to secure

  • The level of encryption used to protect data

Question 5 of 20

You have been called to the office of the CEO for a confidential meeting. In the meeting the CEO informs you he 'has a virus that won't let him login without paying a fee.' You begin to investigate the issue and find that the CEO downloaded a file from a website a friend shared on a social media site. After downloading the file his computer restarted and now will not allow anyone to login unless they enter credit card information. Which option best describes the attack used in this scenario based on the information available?

  • The CEO downloaded and executed Ransomware

  • A botnet is attacking the CEO's computer and disabling login attempts

  • The CEO executed a Rootkit which gave backdoor access to a hacker

  • The CEO was the target of a spear phishing social engineering attack

Question 6 of 20

Crucial Technologies is standing up a new web server. The website hosted on this server is required to be accessed by the general public as part of company operation. To provide security to internal company resources where should the server be placed on the network?

  • Extranet

  • VLAN

  • Screened subnet

  • Intranet

Question 7 of 20

Which access control method combines elements such as user role, the resource being accessed, and the current time to make an access decision?

  • Attribute-based access control

  • Discretionary access control

  • Mandatory access control

  • Role-based access control

Question 8 of 20

An attacker infiltrates a company's network and steals customer credit card information. What is the likely motivation behind this attack?

  • Financial gain

  • Espionage

  • Data exfiltration

  • Revenge

Question 9 of 20

What type of security control is implemented when the primary control cannot be used due to technical, financial, or operational constraints?

  • Deterrent controls

  • Detective controls

  • Compensating controls

  • Preventive controls

Question 10 of 20

A corporation is evaluating the possible financial impact of an internal network compromise. With the internal network assets valued at $2 million, which of the following best illustrates the 'Exposure Factor' for this risk assessment?

  • The $2 million total value of the network assets that are at risk.

  • The likelihood, expressed as a percentage, that the network assets will be compromised each year.

  • The estimated percentage of the $2 million that would be lost if the network is compromised.

  • The annual amount required to insure the $2 million worth of network assets against compromise.

Question 11 of 20

What is the common title for senior management members responsible for overseeing data in their domain?

  • Data manager

  • Data administrator

  • Data protector

  • Data owner

Question 12 of 20

Your company is planning to deploy a critical server infrastructure that must maintain high availability. As a security architect, you are responsible for recommending a solution to ensure that the infrastructure remains operational in the event of a power outage. Which of the following would provide the best protection?

  • Install an Uninterruptible Power Supply (UPS) for the critical servers.

  • Establish a large array of battery banks to provide additional power.

  • Use surge protectors to prevent damage from power surges.

  • Implement redundant power supplies in each critical server.

Question 13 of 20

Which factor is a direct financial consideration when assessing the implementation of a new security control within an organization?

  • Time to remediate vulnerabilities

  • Time-to-market

  • Number of users supported

  • Total cost of ownership

Question 14 of 20

An organization experienced a data breach compromising customer data. Following the incident, the security team implemented measures to restore affected systems and reduce the impact of the breach. Which of the following actions is an example of a corrective control?

  • Conducting a forensic analysis to determine how the breach occurred.

  • Restoring data from backups and applying patches to affected systems.

  • Implementing stronger network firewalls to prevent future breaches.

  • Displaying warning banners on login screens to deter unauthorized access.

Question 15 of 20

Which scenario best illustrates the principle of 'Continuous' risk assessment in an organization's risk management process?

  • Conducting thorough risk assessments at the end of each fiscal year based on yearly metrics

  • Integrating real-time threat intelligence with security systems to dynamically assess risks

  • Performing risk assessments after major changes to IT infrastructure or system updates

  • Scheduling biannual security audits to review and assess organizational risks

Question 16 of 20

A security administrator at a mid-size company is selecting an algorithm for secure email encryption that relies on a public/private key pair rather than a shared secret, to implement digital signatures as well. Which of the following algorithms satisfies this requirement?

  • Blowfish

  • RSA

  • AES

  • RC4

Question 17 of 20

Your company has issued laptops to its employees for remote work. During a routine security audit, you identify that these laptops come with pre-installed software from the manufacturer that is not being used by the employees. What concerns should you have regarding this software from a security perspective?

  • The employees may use this software regularly, which could lead to potential data leaks.

  • The software could be useful for productivity, hence poses no significant risk.

  • This software may contain vulnerabilities that could be exploited by attackers because they often go unmanaged and unpatched.

  • This software can take up disk space, but it does not pose any security concerns.

Question 18 of 20

An attacker successfully exploits a web application vulnerability by using "../" sequences in a URL to access sensitive configuration files located outside of the web server's root directory. Which of the following attack types BEST describes this scenario?

  • Cross-site scripting (XSS)

  • Directory traversal

  • Privilege escalation

  • SQL injection (SQLi)

Question 19 of 20

Which of the following is considered a guideline within effective security governance frameworks?

  • Encryption policies

  • Password standard

  • Acceptable Use Policy (AUP)

  • Change management procedure

  • Data retention guidelines

  • Disaster recovery policy

Question 20 of 20

A security administrator is tasked with improving the employee offboarding process. Currently, the process relies on a manual checklist for disabling user accounts, which has led to several instances of delayed de-provisioning. Which of the following would be the MOST effective solution to mitigate the risk of unauthorized access by former employees?

  • Conduct weekly audits of active user accounts against the current employee roster.

  • Enforce a policy for immediate password changes upon employee termination notification.

  • Implement a stricter manual review process with multiple sign-offs.

  • Automate the de-provisioning of user accounts based on triggers from the HR system.