Welcome to today’s CompTIA Security+ practice test!

This practice test uses our new UI!

Today’s practice test is based on subdomain 4.4 (Explain security alerting and monitoring concepts and tools.) from the CompTIA Security+ SY0-701 objectives.

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, nor are they brain dumps, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To choose CompTIA Security+ practice tests based on specific domains/subdomains, click that link.

CompTIA Security+ Practice Test of the Day 260216
10 questions • Single best answer
Question 1
An analyst in a SOC observes that security logs from multiple domain controllers, firewalls, and cloud workloads are being forwarded to a centralized platform. The platform correlates authentication failures with unusual outbound traffic and generates a high-priority alert. The organization relies on this system to detect suspicious patterns across its hybrid infrastructure. Which of the following tools is being described?
    Question 2
    A security administrator at a mid-sized company notices that its monitoring solution is generating thousands of alerts daily, many of which are later determined to be false positives. This has caused analysts to miss several legitimate incidents due to alert fatigue. Management wants to reduce unnecessary alerts while maintaining visibility into real threats. Which of the following actions would BEST address this issue?
      Question 3
      Your organization recently deployed several new Linux servers in a cloud environment. The security team wants to monitor file changes on critical system binaries and configuration files. If unauthorized modifications occur, the team needs immediate notification. Which of the following tools would BEST meet this requirement?
        Question 4
        An attacker is attempting to move laterally within a corporate network. The SOC wants to monitor unusual east-west traffic patterns between internal hosts without capturing full packet payloads. The team wants visibility into source/destination IP addresses, ports, and traffic volumes to identify abnormal behavior. Which of the following tools would BEST support this requirement?
          Question 5
          A security administrator at a mid-sized company has deployed monitoring agents on all workstations and servers. However, several legacy systems cannot support agent installation. The organization still needs visibility into configuration compliance and vulnerability posture across those systems without installing software locally. Which of the following approaches would BEST meet this requirement?
            Question 6
            An analyst in a SOC observes that network infrastructure devices are configured to automatically send notifications to the monitoring platform when CPU utilization exceeds defined thresholds or when interfaces go down. These notifications are immediately logged and generate alerts for review. Which of the following mechanisms is being used?
              Question 7
              Your organization processes sensitive financial data and must prevent unauthorized transmission of regulated information outside the corporate network. The security team wants real-time monitoring of outbound emails and file transfers to detect and block sensitive data such as credit card numbers and personally identifiable information. Which of the following tools would BEST address this requirement?
                Question 8
                An organization has implemented a vulnerability management program. After patching several high-risk systems, the security team wants to ensure that the vulnerabilities are fully remediated and no longer present. The team also wants documented evidence for audit purposes. Which of the following actions should the team perform NEXT?
                  Question 9
                  Your company operates in a hybrid cloud environment and must ensure that all systems comply with established security configuration baselines. The security team wants an automated method to assess system configurations against standardized benchmarks and generate machine-readable compliance reports for integration with other monitoring tools. Which of the following tools would BEST meet this requirement?
                    Question 10
                    An analyst in a SOC notices that several critical alerts were not generated during a recent malware outbreak. Investigation reveals that relevant endpoint logs were never forwarded to the centralized monitoring system. Management is concerned about gaps in visibility and wants to ensure all required log sources are consistently collected and retained for future analysis. Which of the following activities would BEST address this concern?

                      Take more CompTIA Security+ practice tests