Welcome to today’s CompTIA Security+ practice test!

This practice test uses our new UI!

Today’s practice test is based on Subdomain 3.1 (Compare and contrast security implications of different architecture models) from the CompTIA Security+ SY0-701 objectives.

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, nor are they brain dumps, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To choose CompTIA Security+ practice tests based on specific domains/subdomains, click that link.

Recommended read: Ultimate CompTIA Security+ Study Guide (2026)

CompTIA Security+ Practice Test of the Day 260312
10 questions • Single best answer
Question 1
Your organization recently migrated a portion of its infrastructure to a public cloud provider while retaining sensitive financial processing systems on-premises. The CTO is concerned about defining which party is responsible for patching the hypervisor layer and securing the physical data center facilities. The security team has been asked to produce documentation clarifying these obligations before the next audit cycle. Which concept BEST describes the framework that defines security duties between the cloud customer and the cloud provider?
    Question 2
    A security architect at a manufacturing company is evaluating how to deploy a new control system for the factory floor. The system must operate in real time, tolerate no latency from external network dependencies, and cannot be patched remotely due to operational continuity requirements. The architect notes that this system also runs a specialized operating system that is not a general-purpose OS. Which type of architecture does this scenario BEST describe?
      Question 3
      A penetration tester conducting an assessment for a utility company discovers that the SCADA systems controlling water treatment equipment are connected to the corporate IT network through a single firewall. There is no logical or physical separation between the operational technology (OT) environment and standard business systems. The tester flags this finding as a critical architectural risk. Which security architecture principle is MOST directly being violated in this environment?
        Question 4
        The CISO of a healthcare organization is evaluating architectural options for a new patient records platform. The development team has proposed building the application as a collection of loosely coupled, independently deployable services, each responsible for a single business function such as scheduling, billing, and clinical notes. The CISO wants to understand the security implications of this approach before approving it. Which architecture model is the development team proposing, and what is a PRIMARY security consideration associated with it?
          Question 5
          An analyst in a SOC observes that a critical e-commerce application is hosted entirely on a single cloud provider's infrastructure in one geographic region. Following a brief outage caused by a provider-side networking event, the CISO directs the team to redesign the architecture to prevent a single provider failure from causing total application unavailability. The redesign must also account for differing regulatory requirements in the regions where the company operates. Which architectural approach BEST addresses both the resilience and compliance concerns raised?
            Question 6
            A security architect is reviewing the infrastructure of a startup that has built its entire back-end platform using functions that execute only when triggered by events such as API calls or database changes. The company does not manage any servers, and the cloud provider automatically allocates and deallocates compute resources. The architect notes that patching the underlying execution environment is entirely outside the company's control. Which architecture model does this BEST represent, and which security consideration from objective 3.1 is MOST relevant?
              Question 7
              A security administrator at a mid-sized company is designing a new network architecture. She wants to ensure that if the primary firewall fails, all traffic is dropped and no unauthorized access is permitted until the device is restored. A colleague suggests the opposite approach — allowing traffic to continue flowing freely upon device failure to maintain business continuity. Which terms BEST describe these two failure approaches, respectively, and which is considered more secure?
                Question 8
                An engineer is deploying IoT environmental sensors across a large hospital campus to monitor temperature, humidity, and air quality in critical areas such as operating rooms and server closets. These devices run lightweight, vendor-supplied firmware that cannot be updated by the hospital's IT staff and communicate over the hospital's main wireless network alongside clinical workstations and administrative computers. Which TWO architectural risks from objective 3.1 BEST apply to this deployment? (Choose the answer that captures both risks.)
                  Question 9
                  A network engineer is tasked with redesigning the WAN connectivity for a company with 40 branch offices. The current architecture relies on expensive MPLS circuits with static routing, and the IT team struggles to make real-time policy changes in response to threat intelligence. The CISO wants a solution that allows centralized policy management, can route traffic intelligently based on application type and real-time network conditions, and reduces dependence on fixed-circuit providers. Which architecture model BEST meets these requirements?
                    Question 10
                    The CISO of a financial institution is evaluating the security implications of adopting a decentralized architecture for a new trading platform. Under this model, processing and data storage would be distributed across multiple regional nodes with no single controlling authority, in contrast to the current centralized mainframe environment. The security team must brief the board on the trade-offs. Which statement MOST accurately reflects a security consideration when comparing centralized versus decentralized architectures as described in objective 3.1?
                      Desk Mat CTA Block
                      Cybersecurity Acronyms Desk Mat

                      Tired of Googling acronyms while practicing/studying?
                      Keep them all under your keyboard.

                      📋 GET_THE_DESK_MAT

                      Take more CompTIA Security+ practice tests

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *