Welcome to today’s CompTIA Security+ practice test!

This practice test uses our new UI!

Today’s practice test is based on subdomain 4.6 (Given a scenario, implement and maintain identity and access management.) from the CompTIA Security+ SY0-701 objectives.

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, nor are they brain dumps, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To choose CompTIA Security+ practice tests based on specific domains/subdomains, click that link.

CompTIA Security+ Practice Test of the Day 260218
10 questions • Single best answer
Question 1
A security administrator at a mid-sized company is responsible for onboarding new employees in a hybrid cloud environment that includes on-premises Active Directory and multiple SaaS platforms. The organization has experienced delays in disabling accounts when employees leave, resulting in several dormant accounts remaining active for weeks. Leadership wants to reduce the risk of unauthorized access due to orphaned accounts while improving operational efficiency. Which of the following is the BEST solution to address this issue?
    Question 2
    An analyst in a SOC observes repeated authentication attempts against a cloud-hosted finance application. The organization recently implemented multifactor authentication (MFA) using time-based one-time passwords (TOTP). However, executives are concerned about phishing attacks that may bypass current MFA methods through real-time proxy attacks. Which of the following MFA implementations would BEST reduce the risk of phishing-based credential interception?
      Question 3
      Your organization is implementing access controls for a highly regulated healthcare system that stores sensitive patient records. Access decisions must be enforced based on data classification labels, user clearance levels, and predefined security policies. Individual users must not be able to override these access decisions. Which access control model BEST meets these requirements?
        Question 4
        A security administrator at a global enterprise is implementing single sign-on (SSO) between an internal identity provider (IdP) and several third-party SaaS providers. The solution must support browser-based authentication and securely transmit authorization assertions between the IdP and service providers using XML. Which of the following technologies should the administrator implement?
          Question 5
          Your company is adopting a zero trust architecture and wants to ensure that access to internal applications is granted dynamically based on user attributes such as department, device compliance status, geographic location, and risk score from a user behavior analytics system. The organization does not want access decisions to rely solely on static job titles. Which of the following access control models BEST meets these requirements?
            Question 6
            A security administrator at a financial services firm needs to grant database administrators elevated privileges to production systems, but only for short maintenance windows. Leadership wants to eliminate standing administrative privileges and reduce the risk of credential abuse. Which of the following solutions BEST addresses this requirement?
              Question 7
              An organization is implementing password policies for remote employees who authenticate to both on-premises and cloud-based resources. Security leadership wants to reduce the risk of password reuse across systems while also minimizing user frustration and help desk calls. Which of the following is the BEST recommendation?
                Question 8
                An attacker is attempting to access an enterprise VPN by using credentials obtained from a previous data breach. The organization has implemented multifactor authentication requiring something you know and something you have. The attacker successfully enters the correct password but cannot complete the authentication process because they do not possess the required authentication factor. Which of the following factors is MOST likely preventing the attacker from gaining access?
                  Question 9
                  A security administrator at a mid-sized company is configuring access to a shared file server. The organization wants department managers to control access to files they own, allowing them to grant or revoke permissions for their teams without involving the IT department. However, executive leadership understands this model may introduce certain risks. Which of the following access control models is being implemented?
                    Question 10
                    Your organization is federating identity services with a third-party partner to allow employees to access the partner’s web-based application using their corporate credentials. The solution must allow authentication to occur at your organization’s identity provider while enabling the partner to trust the authentication assertion without storing user passwords. Which of the following concepts is being implemented?

                      Take more CompTIA Security+ practice tests