Welcome to today’s practice test!

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

 

Results

QUIZ START

#1. A security administrator at a mid-sized company is reviewing their organization’s VPN configuration to ensure data confidentiality and integrity during remote access sessions. Which protocol would be the most appropriate to secure these VPN tunnels?

Previous
Next

#2. An analyst in a SOC observes multiple failed login attempts from the same external IP, followed by a successful login using an admin account. The login originated from a country where the company has no operations. What is the best next step for the analyst to take?

Previous
Next

#3. A security engineer is tasked with selecting a solution to centrally monitor and correlate logs from servers, applications, and network devices. Which solution is best suited for this purpose?

Previous
Next

#4. A security administrator must apply segmentation controls to isolate IoT devices on the network. The goal is to reduce the attack surface while allowing the devices to communicate only with required cloud services. Select two controls that should be implemented to achieve this.

Select all that apply:

Previous
Next

#5. An attacker is attempting to gather employee email addresses by harvesting them from public sources and using typosquatted domains to trick users. Which type of attack is this?

Previous
Next

#6. An IT administrator is updating documentation after configuring new firewall rules. What type of document should they update to reflect these technical changes?

Previous
Next

#7. An organization is deploying a cloud service with shared responsibility for security between the provider and the customer. What cloud model is being used?

Previous
Next

#8. An insider threat is most likely to have which advantage over external attackers?

Previous
Next

#9. A network engineer configures 802.1X on network switches. What is the primary benefit of this configuration?

Previous
Next

#10. An analyst in a SOC observes a suspicious process running on several endpoints. The process is encrypting files and appending an unfamiliar extension. Users are unable to access their data. What type of attack is occurring?

Previous
Finish

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To view CompTIA Security+ practice tests on other days, click here.To view answers for today’s questions, expand the Answers accordion below.

Answers
  1. B
  2. B
  3. A
  4. A,B
  5. B
  6. C
  7. A
  8. C
  9. C
  10. C

Leave a Reply

Your email address will not be published. Required fields are marked *