Welcome to today’s practice test!
This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.
These questions are not official exam questions, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.
Select all that apply: Select all that apply:Results
#1. A security administrator at a mid-sized company is implementing MFA for a critical business application. The users will access it from multiple locations, including travel abroad. Which factor would be the LEAST reliable in this scenario?
#2. An attacker is attempting to gain unauthorized access by repeatedly submitting different password combinations against a public-facing web portal. Which type of attack is most likely occurring?
#3. A company uses third-party developers to build a web application. What should the security team request to verify that sensitive data is properly protected at rest?
#4. A security administrator at a mid-sized company needs to ensure that users accessing a sensitive internal web application are strongly verified and cannot reuse old credentials. The administrator wants to enforce authentication based on possession of a cryptographic token.
#5. An attacker is attempting to trick employees into revealing login credentials through fake corporate login pages delivered via email. Which type of attack is this?
#6. You are asked to harden a Linux server. Select all the appropriate actions from the following list:
#7. An analyst in a SOC observes that several internal systems are generating traffic to known malicious IPs, bypassing the company’s traditional firewall. What is the MOST likely cause?
#8. A cloud architect is designing a secure hybrid cloud solution. To manage differences in responsibilities between the cloud provider and the company, what should be referenced?
#9. A security administrator needs to securely transmit log files between sites over the internet. Which protocol would be BEST to use?
#10. You must improve resilience for a business-critical application hosted in your data center. Choose the BEST two solutions:
Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.
To view CompTIA Security+ practice tests on other days, click here.To view answers for today’s questions, expand the Answers accordion below.
Answers
- C
- B
- C
- B
- C
- A, C, D, F
- C
- B
- C
- A, E