CompTIA Security+ Practice Test of the Day 260430

Welcome to today’s CompTIA Security+ practice test!

This practice test uses our new UI!

Today’s practice test is based on Subdomain 2.2 (Explain common threat vectors and attack surfaces) from the CompTIA Security+ SY0-701 objectives.

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, nor are they brain dumps, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To choose CompTIA Security+ practice tests based on specific domains/subdomains, click that link.

Recommended read: Ultimate CompTIA Security+ Study Guide (2026)

CompTIA Security+ Practice Test of the Day 260430
10 questions • Single best answer
Question 1
A penetration tester engaged by a mid-sized logistics company discovers that several workstations are still running Windows 7, which reached end-of-life in January 2020. The systems are connected to the corporate network and process shipment tracking data. The tester flags these systems in the final report as a critical risk. Which threat vector do these systems PRIMARILY represent?
    Question 2
    An employee at a healthcare organization receives a text message appearing to come from the company's IT department, stating that their VPN credentials will expire unless they click a link and re-enter their password. The link leads to a convincing replica of the corporate login portal. The employee enters their credentials before realizing the message was suspicious. Which threat vector was used in this attack?
      Question 3
      A threat intelligence analyst at a government contractor reviews an incident where malware was delivered through a compromised update server belonging to a third-party IT management vendor. The malware spread to dozens of client organizations that relied on the vendor's remote monitoring software. This attack pattern is consistent with which threat vector?
        Question 4
        A security engineer is reviewing wireless network configurations during an audit of a manufacturing plant. She discovers several access points broadcasting on open, unencrypted SSIDs that were set up years ago for contractor convenience and never decommissioned. Production floor devices connect to these networks to send telemetry data. Which attack surface does this configuration MOST directly expose?
          Question 5
          A red team discovers that a network-attached storage device on a corporate subnet is accessible with the username 'admin' and password 'admin'. The device was deployed by a vendor six months ago and was never reconfigured by the internal IT team. Sensitive project files are stored on the device. Which attack surface does this represent?
            Question 6
            An attacker registers the domain 'micros0ft-support.com' and hosts a convincing support page that prompts visitors to download a 'security patch.' Employees at several companies search for Microsoft support and land on this page after mistyping or following a lookalike result. Which social engineering technique is BEST illustrated by this scenario?
              Question 7
              A security analyst investigating an incident discovers that an attacker sent an email appearing to be from the organization's CFO, instructing the accounts payable team to wire funds to a new vendor account. The email domain was slightly different from the real domain, and no phone verification was performed. Which human vector BEST describes this attack?
                Question 8
                An attacker identifies a popular online forum frequented by employees of a specific defense contractor. The attacker compromises the forum's web server and embeds malicious JavaScript that silently exploits a browser vulnerability when employees visit the site. Which threat vector does this attack BEST represent?
                  Question 9
                  During a security awareness training session, an instructor describes a scenario where an attacker leaves several USB drives labeled 'Q4 Salary Data' in a company parking lot. Curious employees plug the drives into their work computers, unknowingly executing malware. Which threat vector does this scenario illustrate?
                    Question 10
                    A network administrator notices that a firewall's TCP port 23 is open and accessible from the internet on a legacy industrial control system. The ICS vendor has confirmed the system cannot be patched and that no agent-based security tools can be installed on it. An attacker could use this exposure to send unencrypted commands to the system. Which two attack surface elements are MOST prominently represented? (Choose the BEST single answer that captures both.)
                      Desk Mat CTA Block
                      Cybersecurity Acronyms Desk Mat

                      Tired of Googling acronyms while practicing/studying?
                      Keep them all under your keyboard.

                      📋 GET_THE_DESK_MAT

                      Take more CompTIA Security+ practice tests

                      Leave a Comment

                      Your email address will not be published. Required fields are marked *

                      Scroll to Top