Welcome to today’s CompTIA Security+ practice test!

This practice test uses our new UI!

Today’s practice test is based on Subdomain 2.5 (Explain the purpose of mitigation techniques used to secure the enterprise) from the CompTIA Security+ SY0-701 objectives.

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, nor are they brain dumps, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To choose CompTIA Security+ practice tests based on specific domains/subdomains, click that link.

Recommended read: Ultimate CompTIA Security+ Study Guide (2026)

CompTIA Security+ Practice Test of the Day 260310
10 questions • Single best answer
Question 1
A security administrator at a mid-sized financial services firm is reviewing the results of a recent internal audit. The audit found that several legacy Windows servers are running outdated software with known vulnerabilities, but the business unit has rejected an immediate patching schedule due to application compatibility concerns. In the interim, the security team needs to implement a control that limits the blast radius if one of these servers is compromised. The servers currently share a flat network with workstations and other critical infrastructure. Which mitigation technique BEST addresses the risk posed by these unpatched legacy servers while the patching schedule is negotiated?
    Question 2
    A penetration tester has gained initial access to a workstation inside a corporate network and is attempting to escalate privileges. After running enumeration scripts, the tester discovers that many user accounts have been granted local administrator rights, several unused services are running, and default vendor passwords are still active on multiple network management interfaces. The organization's security team is tasked with hardening the environment based on the findings. Which combination of hardening techniques MOST directly addresses the vulnerabilities identified in this scenario?
      Question 3
      An analyst in a SOC observes repeated alerts indicating that a single contractor account is successfully logging into a file server, accessing sensitive HR documents, and then logging out — all within a two-minute window, repeated every hour on the hour. The contractor's role should only require access to project management tools, and their contract ended 30 days ago. The SOC team suspects the account is being used maliciously. Which TWO mitigation techniques should be prioritized FIRST to contain this threat? (Select the answer option that correctly identifies the two BEST immediate actions.)
        Question 4
        Your organization recently completed a risk assessment and identified that several internet-facing web servers are running software packages that are no longer needed for any business function. Additionally, the assessment found that a number of TCP ports that were opened during a previous project remain open and unmonitored. The CISO has directed the security team to reduce the external attack surface as a priority. Which mitigation approach BEST aligns with the CISO's directive?
          Question 5
          A security engineer at a healthcare organization is deploying a new fleet of workstations that will process electronic protected health information (ePHI). Regulatory requirements mandate that the data must be unreadable if a device is lost or stolen. The engineer also needs to ensure that malware cannot execute from removable media, and that the operating system is protected against known vulnerabilities through regular patching. Which set of hardening techniques satisfies ALL three requirements?
            Question 6
            A systems administrator is responding to a security incident in which an attacker exploited a vulnerable web application and gained code execution on the underlying server. Forensic analysis reveals the attacker was able to move laterally to a database server containing customer PII because both systems shared the same network segment and communicated freely. During the post-incident review, the team is asked to recommend mitigations that would have limited the impact of this specific attack. Which mitigation technique would have been MOST effective at limiting the lateral movement described?
              Question 7
              The CISO of a retail organization is concerned about the risk of an insider threat following a recent incident where a database administrator exported a large volume of customer payment records to a personal cloud storage account. After reviewing the incident, the security team recommends several mitigations. The CISO specifically wants controls that prevent employees from accessing data beyond what their job function requires and that detect or block future unauthorized data transfers. Which combination of mitigations BEST addresses both concerns?
                Question 8
                A cloud security engineer at a SaaS company is reviewing the security posture of the organization's cloud infrastructure. During the review, it is discovered that several virtual machines have been deployed without following the organization's approved security baseline — they are missing endpoint protection, have local firewall rules disabled, and have not received patches in over six months. The engineer needs to recommend a systematic approach to prevent this from happening again. Which mitigation technique MOST directly addresses this ongoing configuration drift problem?
                  Question 9
                  An attacker has compromised a single endpoint within a corporate network after a user opened a malicious email attachment. Security logs show the malware is actively attempting to scan internal subnets, connect to other hosts on port 445, and enumerate shared drives. The incident response team has been notified and needs to immediately limit further spread of the infection while preserving forensic evidence on the compromised host. Which mitigation technique BEST achieves containment without destroying evidence?
                    Question 10
                    A governance, risk, and compliance (GRC) analyst at an enterprise organization is evaluating the security controls applied to a group of servers that process regulated financial data. The servers have reached end-of-life from the vendor, meaning security patches are no longer being released. The business unit has stated the servers cannot be replaced for at least 18 months due to budget constraints. The analyst must recommend mitigations that reduce risk in the absence of available patches. Which combination of techniques from the SY0-701 2.5 mitigation framework BEST reduces the risk of these end-of-life servers being exploited?
                      Desk Mat CTA Block
                      Cybersecurity Acronyms Desk Mat

                      Tired of Googling acronyms while practicing/studying?
                      Keep them all under your keyboard.

                      📋 GET_THE_DESK_MAT

                      Take more CompTIA Security+ practice tests

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *