Welcome to today’s CompTIA Security+ practice test!

This practice test uses our new UI!

Today’s practice test is based on Subdomain 5.3 (Explain the processes associated with third-party risk assessment and management) from the CompTIA Security+ SY0-701 objectives.

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, nor are they brain dumps, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To choose CompTIA Security+ practice tests based on specific domains/subdomains, click that link.

Recommended read: Ultimate CompTIA Security+ Study Guide (2026)

CompTIA Security+ Practice Test of the Day 260407
10 questions • Single best answer
Question 1
A procurement security officer at a global manufacturing company is negotiating a contract with a new cloud-based ERP software vendor. The company's legal and security teams are concerned about the vendor's security controls, particularly around data handling and access management practices, given that the ERP system will process sensitive financial and operational data. During contract negotiations, the security team insists on including a specific clause that grants the company the contractual right to assess the vendor's security controls, review security documentation, and conduct on-site inspections at a mutually agreed-upon time in the future if warranted. Which contractual provision is the security team requesting?
    Question 2
    A vendor risk analyst at a financial institution is reviewing the contract package for a new third-party data analytics firm that will be processing customer behavioral data as part of a fraud detection initiative. Before any project documentation, system architecture details, or customer data samples are shared with the vendor during the pre-engagement phase, legal counsel advises the institution to execute a specific agreement that legally binds the vendor's personnel from disclosing or using proprietary information for purposes other than the contracted engagement. The institution needs this protection in place before sensitive materials can be exchanged. Which type of agreement should the institution execute with the vendor prior to sharing sensitive pre-engagement materials?
      Question 3
      Your organization is evaluating several competing managed security service providers (MSSPs) to take over 24/7 SOC monitoring operations. The evaluation committee is tasked with selecting the vendor that best meets the organization's security and operational requirements while presenting the lowest risk profile. Before finalizing any selection, the committee requests copies of each MSSP's SOC 2 Type II audit reports, reviews their financial stability disclosures, checks three industry references from organizations of similar size, and investigates each vendor's history of breaches, regulatory violations, and litigation. Which vendor selection activity does this evaluation process represent?
        Question 4
        A security architect at a state government agency is working with a neighboring county government to formalize an arrangement for sharing cybersecurity threat intelligence feeds and incident response resources during regional emergencies. Both parties have reached alignment on the general intent, scope of cooperation, and high-level responsibilities, but have not committed to legally binding obligations or an exchange of funds at this stage. The legal teams from both entities want a document that captures the mutual understanding and intent of both parties to cooperate, establishes a framework for the relationship, and does not impose enforceable legal liability on either party before formal agreements are finalized. Which type of agreement BEST describes what both parties should execute?
          Question 5
          A security engineer at an aerospace defense contractor has been tasked with assessing risks introduced through the organization's hardware supply chain. Several mission-critical systems rely on specialized microcontrollers sourced from third-party international component manufacturers, and recent intelligence reports have identified nation-state actors inserting counterfeit or tampered components into the global electronics supply chain targeting defense contractors. The engineer must evaluate the integrity of sourcing and procurement processes, identify which suppliers represent the highest risk, and determine whether adequate verification processes exist to detect hardware tampering before components are integrated into production systems. Which third-party risk assessment activity is the engineer performing?
            Question 6
            A cloud infrastructure team at a large e-commerce company has contracted with a cloud service provider (CSP) for hosting its production web application environment. The organization's business requirements mandate that the production environment maintain 99.95% uptime, that the CSP acknowledge critical incident alerts within 15 minutes of detection, and that monthly performance reports be delivered to the operations team. The e-commerce company wants these specific performance commitments formally documented in a binding contract addendum that also specifies remedies — such as service credits — if performance standards are not achieved. Which type of agreement should govern these performance commitments?
              Question 7
              A third-party risk manager at a multinational pharmaceutical company recently completed the onboarding of a contract research organization (CRO) that will handle clinical trial data under the company's data processing agreements. The initial assessment verified the CRO's security controls and compliance posture before contract execution. The risk manager recognizes that vendor security posture can degrade significantly after onboarding due to staff turnover, infrastructure changes, or reduced security investment. To address this, the manager establishes a program requiring annual security questionnaire updates from the CRO, review of any changes to the CRO's security certifications, and notification obligations when significant security events occur at the vendor's facilities. Which ongoing third-party risk management activity is the risk manager implementing?
                Question 8
                A penetration tester has been contracted by a healthcare organization to assess the security posture of a medical device company being evaluated for acquisition before integration into the enterprise network. Before any testing begins, the healthcare organization's security team and the penetration tester collaborate to produce a formal document that specifies which systems are authorized for testing, which testing techniques are permitted, which systems are explicitly excluded from the scope, the notification procedures if a critical vulnerability is discovered during testing, and the emergency contact information for both parties in the event that testing causes an unintended service disruption. Which component of the vendor assessment engagement does this pre-test documentation represent?
                  Question 9
                  A legal counsel at a technology consulting firm is helping a client structure a long-term engagement with an IT security consulting company that will be retained for multiple discrete security projects over the next three years — including red team exercises, security architecture reviews, and compliance gap assessments. Legal counsel recommends a two-document structure: one overarching agreement that establishes the general terms and conditions governing the entire multi-year relationship, including payment terms, liability limitations, intellectual property ownership, and confidentiality obligations; and separate project-specific documents executed at the start of each individual engagement that define the specific deliverables, timelines, and pricing for that project. Which pair of agreement types does legal counsel's recommended structure represent, respectively?
                    Question 10
                    A vendor risk analyst at a financial services firm is conducting an annual review of a third-party payment processor that handles card transaction data on behalf of the firm. As part of the review, the analyst requests formal documentation from the payment processor demonstrating that qualified external auditors have assessed the vendor's information security management system and controls against recognized industry standards — specifically requesting the vendor's most recent SOC 2 Type II report and its PCI DSS Report on Compliance (ROC). Both reports were produced by accredited external audit firms following formal evaluation engagements. Which category of vendor assessment evidence does the analyst's review represent?
                      Desk Mat CTA Block
                      Cybersecurity Acronyms Desk Mat

                      Tired of Googling acronyms while practicing/studying?
                      Keep them all under your keyboard.

                      📋 GET_THE_DESK_MAT

                      Take more CompTIA Security+ practice tests

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *