Welcome to today’s practice test!

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

 

Results

QUIZ START

#1. A security administrator at a mid-sized company is implementing MFA for a critical business application. The users will access it from multiple locations, including travel abroad. Which factor would be the LEAST reliable in this scenario?

Previous
Next

#2. An attacker is attempting to gain unauthorized access by repeatedly submitting different password combinations against a public-facing web portal. Which type of attack is most likely occurring?

Previous
Next

#3. A company uses third-party developers to build a web application. What should the security team request to verify that sensitive data is properly protected at rest?

Previous
Next

#4. A security administrator at a mid-sized company needs to ensure that users accessing a sensitive internal web application are strongly verified and cannot reuse old credentials. The administrator wants to enforce authentication based on possession of a cryptographic token.

Previous
Next

#5. An attacker is attempting to trick employees into revealing login credentials through fake corporate login pages delivered via email. Which type of attack is this?

Previous
Next

#6. You are asked to harden a Linux server. Select all the appropriate actions from the following list:

Select all that apply:

Previous
Next

#7. An analyst in a SOC observes that several internal systems are generating traffic to known malicious IPs, bypassing the company’s traditional firewall. What is the MOST likely cause?

Previous
Next

#8. A cloud architect is designing a secure hybrid cloud solution. To manage differences in responsibilities between the cloud provider and the company, what should be referenced?

Previous
Next

#9. A security administrator needs to securely transmit log files between sites over the internet. Which protocol would be BEST to use?

Previous
Next

#10. You must improve resilience for a business-critical application hosted in your data center. Choose the BEST two solutions:

Select all that apply:

Previous
Finish

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To view CompTIA Security+ practice tests on other days, click here.To view answers for today’s questions, expand the Answers accordion below.

Answers
  1. C
  2. B
  3. C
  4. B
  5. C
  6. A, C, D, F
  7. C
  8. B
  9. C
  10. A, E

Leave a Reply

Your email address will not be published. Required fields are marked *