Welcome to today’s CompTIA Security+ practice test!

This practice test uses our new UI!

Today’s practice test is based on subdomain 1.4 (Explain the importance of using appropriate cryptographic solutions.) from the CompTIA Security+ SY0-701 objectives.

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, nor are they brain dumps, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To choose CompTIA Security+ practice tests based on specific domains/subdomains, click that link.

Recommended read: Ultimate CompTIA Security+ Study Guide (2026)

CompTIA Security+ Practice Test of the Day 260304
10 questions • Single best answer
Question 1
A security engineer at a healthcare organization is designing a system to protect patient records stored in a database. The organization needs to ensure that even if the database is compromised, individual fields containing Social Security Numbers and dates of birth cannot be read by an attacker. The engineer is evaluating whether to use tokenization or data masking, and must choose the approach that allows the original value to be retrieved later through a secure lookup system when authorized personnel need it. Which technique BEST meets this requirement?
    Question 2
    A penetration tester is reviewing the cryptographic configuration of a legacy web application. The application uses an older TLS implementation that permits the negotiation of cipher suites using RC4 for stream encryption. The tester demonstrates to the client that this configuration can be exploited to force the connection to use a weaker cipher than originally negotiated, reducing the security of the session significantly. Which type of cryptographic attack is the tester describing?
      Question 3
      Your organization recently deployed a fleet of laptops for field technicians who frequently work in locations without network access. IT leadership is concerned that if a device is lost or stolen, an attacker with physical access could remove the hard drive and read data directly by connecting it to another machine. The security team is evaluating which encryption solution provides the strongest protection specifically against this threat model. Which solution BEST addresses this concern?
        Question 4
        A developer at a financial services firm recently submitted a code change that introduces a new user authentication module. During a peer review, a senior security engineer flags that the module stores user passwords as plain MD5 hashes with no additional processing. The engineer explains that this implementation is vulnerable to precomputed lookup table attacks and that a specific additional technique should be applied before hashing. Which technique should the developer implement to mitigate this vulnerability?
          Question 5
          An analyst in a SOC is reviewing a TLS certificate for an internal application and notices that the certificate was issued directly by the organization's own CA without any intermediate CA in the chain. Management asks whether this matters from a security standpoint. The analyst explains that in a well-designed PKI, the root CA should be kept offline and signing should be delegated, but also notes a specific risk if the organization's CA certificate itself is ever compromised. Which PKI concept describes the foundational element that establishes the basis of trust in this certificate chain?
            Question 6
            A security administrator is configuring encryption for a new enterprise application that will securely exchange a symmetric session key between two servers over an untrusted network. The administrator needs to ensure that even if long-term private keys are later compromised, previously recorded encrypted sessions cannot be decrypted by an attacker. The chosen solution must support this property while still using asymmetric cryptography for the initial key exchange. Which property or mechanism BEST satisfies this requirement?
              Question 7
              A compliance officer at a law firm is evaluating the organization's current PKI certificate management practices ahead of a regulatory audit. One concern raised is that the organization has no real-time mechanism for clients to verify whether a certificate has been revoked. It only maintains a periodically published revocation list that clients download on a scheduled basis. Auditors note that the gap between list publications creates a window during which a revoked certificate could still be accepted as valid. Which technology should the organization implement to address this specific gap?
                Question 8
                A security architect is reviewing the cryptographic approach used by a third-party vendor to verify the integrity and authenticity of software updates pushed to enterprise endpoints. The vendor claims that each update package is cryptographically signed before distribution, and that the endpoint agent verifies the signature before installation. The architect wants to confirm that this process correctly supports both integrity verification and non-repudiation. Which cryptographic mechanism is the vendor describing, and what does it specifically provide?
                  Question 9
                  During an internal audit, an auditor discovers that a cloud storage system used by the HR department is storing employee W-2 forms, performance reviews, and termination records as unencrypted files in a shared container. The CISO asks the security team to evaluate appropriate encryption strategies. The security team notes that these files are not actively being processed, they are archived and retrieved only occasionally, and the solution must protect against unauthorized access if cloud provider credentials are compromised. Which encryption approach BEST addresses this scenario?
                    Question 10
                    A forensic investigator is examining a compromised web server and discovers that an attacker exfiltrated what appeared to be ordinary image files from a publicly accessible directory. Upon closer inspection, the investigator runs a specialized analysis tool and finds that each image contains hidden text embedded within the least significant bits of the pixel data. The hidden content includes internal API keys and configuration strings that the attacker used to pivot deeper into the organization's infrastructure. Which data obfuscation technique did the attacker use to conceal the exfiltrated configuration data?
                      Mug CTA Block
                      Cybersecurity mugs — Decrypting This Brew & Encrypting My Thoughts

                      Studying for Security+? This mug was made for late-night practice tests.

                      🔓 ACCESS_THE_MUG

                      Take more CompTIA Security+ practice tests

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *