CompTIA Security+ Practice Test of the Day 260428

Welcome to today’s CompTIA Security+ practice test!

This practice test uses our new UI!

Today’s practice test is based on Subdomain 1.4 (Explain the importance of using appropriate cryptographic solutions.) from the CompTIA Security+ SY0-701 objectives.

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, nor are they brain dumps, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To choose CompTIA Security+ practice tests based on specific domains/subdomains, click that link.

Recommended read: Ultimate CompTIA Security+ Study Guide (2026)

CompTIA Security+ Practice Test of the Day 260429
10 questions • Single best answer
Question 1
A security engineer at a defense contractor is hardening a fleet of employee laptops used to access classified systems. The engineer needs to ensure that cryptographic keys are bound to the hardware so they cannot be extracted if a device is lost or stolen. The solution must be a dedicated chip embedded directly in the motherboard and require no external hardware. Which technology BEST fulfills this requirement?
    Question 2
    A financial institution is rolling out full-disk encryption across all employee workstations to protect sensitive customer data. The legal team has mandated that the organization must retain the ability to decrypt any workstation if an employee leaves abruptly without surrendering their passphrase. The security architect must select a cryptographic control that satisfies this legal requirement. Which practice BEST meets this need?
      Question 3
      A software vendor distributes firmware updates to thousands of IoT devices deployed across customer facilities. After an incident in which tampered firmware was installed on a subset of devices, the security team needs a mechanism to prove both the authenticity of the vendor and the integrity of each update package before installation. Which cryptographic solution BEST addresses this requirement?
        Question 4
        A DevOps team at an e-commerce company is configuring application servers to validate the revocation status of TLS certificates used by third-party payment processors. The security team wants a solution that provides real-time revocation checking without requiring clients to download large, periodically refreshed revocation files. Which mechanism BEST satisfies this requirement?
          Question 5
          After a data breach, a forensic team discovers that attackers cracked a large percentage of stolen password hashes by running them against a precomputed rainbow table. The affected system applied SHA-256 to each password with no additional processing before storage. Which countermeasure would MOST directly defeat rainbow table attacks against future stored password hashes?
            Question 6
            A development team building a new web application wants to store user passwords such that a compromised database provides minimal value to an attacker attempting a dictionary attack. The security lead recommends an algorithm that deliberately applies the core hash function thousands of times in sequence to make each password verification attempt computationally expensive. Which cryptographic technique does this describe?
              Question 7
              A retail company is achieving PCI DSS compliance and needs to ensure that real payment card numbers are not retained in its transaction database after purchases are processed. The solution must also allow the company to reference the original card number for future chargebacks and refunds without storing the card number in plaintext or in any reversible encrypted form within the database. Which data protection technique BEST satisfies both requirements?
                Question 8
                A SaaS company is expanding its platform and currently hosts applications on app.example.com, api.example.com, and portal.example.com. The operations team wants to issue a single TLS certificate that automatically covers all current subdomains and any new subdomains added under example.com in the future, without requiring reissuance each time. Which certificate type BEST meets this requirement?
                  Question 9
                  A network security student analyzing a TLS 1.3 packet capture observes that the handshake phase uses asymmetric cryptography to establish a shared secret, after which all application data is encrypted using AES-256-GCM. The student is asked why the protocol switches algorithms mid-session rather than using asymmetric encryption throughout. What is the PRIMARY reason for this hybrid design?
                    Question 10
                    A digital forensics analyst investigating a suspected insider threat discovers that an employee uploaded hundreds of vacation photo files to a personal cloud account before resigning. Analysis reveals the images are structurally valid JPEG files, but each contains unexpected binary payloads embedded within the pixel data that do not affect the visible image. The analyst suspects sensitive documents were concealed within the photos without any use of traditional encryption. Which obfuscation technique BEST describes this method?
                      Desk Mat CTA Block
                      Cybersecurity Acronyms Desk Mat

                      Tired of Googling acronyms while practicing/studying?
                      Keep them all under your keyboard.

                      📋 GET_THE_DESK_MAT

                      Take more CompTIA Security+ practice tests

                      Leave a Comment

                      Your email address will not be published. Required fields are marked *

                      Scroll to Top