Welcome to today’s practice test!

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

 

Results

QUIZ START

#1. A security administrator at a mid-sized enterprise notices that several employees are accessing social media websites that have led to malware infections. The administrator wants to block access to such sites at the network level. Which of the following would BEST meet this goal?

Previous
Next

#2. An attacker is attempting to harvest credentials by redirecting users to a malicious site that mimics a legitimate login page using a typo in the domain name. Which attack method is being used?

Previous
Next

#3. An attacker is attempting to exploit a race condition in a web application by submitting multiple simultaneous requests. Which type of vulnerability is the attacker targeting?

Previous
Next

#4. A penetration tester is using tools to scan a web application without accessing its source code. The goal is to identify vulnerabilities like SQLi and XSS. Which technique is being used?

Previous
Next

#5. A user reports being redirected to a spoofed website despite typing the correct URL. The DNS settings on their machine appear unchanged. What is the MOST likely cause?

Previous
Next

#6. A system administrator wants to enforce least privilege access to sensitive database systems in a finance department. Which access control model would BEST achieve this?

Previous
Next

#7. An analyst in a SOC notices repeated login attempts across multiple accounts originating from the same IP within a short time frame. What type of attack is MOST likely occurring?

Previous
Next

#8. A security administrator is updating the organization’s incident response plan. Which of the following steps should occur FIRST in the event of a suspected security breach?

Previous
Next

#9. A developer is implementing OAuth 2.0 in a new web application. What is the PRIMARY purpose of OAuth?

Previous
Next

#10. You are tasked with configuring multifactor authentication (MFA) for a corporate VPN. The organization wants to use something the user knows and something they have. Task: Select the TWO most appropriate factors to fulfill this requirement.

Select all that apply:

Previous
Finish

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To view CompTIA Security+ practice tests on other days, click here.To view answers for today’s questions, expand the Answers accordion below.

Answers
  1. C
  2. B
  3. B
  4. B
  5. D
  6. C
  7. B
  8. D
  9. C
  10. B, C

Leave a Reply

Your email address will not be published. Required fields are marked *