Welcome to today’s practice test!

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

 

Results

QUIZ START

#1. A security administrator at a financial firm is reviewing logs from a web server and notices repeated requests to the same endpoint with different SQL statements in the URL parameters. The administrator suspects an attack is underway. Which of the following is the MOST likely attack type?

Previous
Next

#2. An attacker is attempting to gain access to a cloud-based system by using previously leaked user credentials across multiple services. Which of the following BEST describes this type of attack?

Previous
Next

#3. An analyst in a SOC observes a large number of failed login attempts to an internal database server, all originating from the same external IP address. What is the MOST appropriate immediate response?

Previous
Next

#4. A network administrator wants to restrict wireless access to only company-issued devices using digital certificates. Which of the following should be implemented?

Previous
Next

#5. A cloud-based CRM system experienced a security breach through a third-party plugin with a known vulnerability. The plugin was developed by a vendor that wasn’t thoroughly vetted. Which security process failed in this scenario?

Previous
Next

#6. An attacker uses a rogue Wi-Fi access point that mimics the name of a legitimate network to trick users into connecting. Which of the following attacks is being conducted?

Previous
Next

#7. A user reports their computer is behaving unusually. The SOC team finds a keylogger and remote access Trojan installed. The malware was introduced via a malicious email attachment. What type of attack vector was used?

Previous
Next

#8. A system administrator needs to implement a solution to centrally manage and enforce mobile device security policies across the organization. Which of the following is the BEST tool for this?

Previous
Next

#9. A company’s business continuity plan requires that systems be operational within two hours of a disruption, and no more than 15 minutes of data can be lost. What are the respective RTO and RPO values?

Previous
Next

#10. An enterprise is deploying an SD-WAN solution to improve connectivity and security across branch offices. Which of the following features does SD-WAN MOST LIKELY provide?

Previous
Finish

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To view CompTIA Security+ practice tests on other days, click here.To view answers for today’s questions, expand the Answers accordion below.

Answers
  1. B
  2. B
  3. C
  4. C
  5. C
  6. A
  7. B
  8. C
  9. B
  10. B

Leave a Reply

Your email address will not be published. Required fields are marked *