Welcome to today’s practice test!
This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.
These questions are not official exam questions, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.
Results
#1. A security administrator at a financial institution is implementing a new DLP (Data Loss Prevention) system. They need to ensure that sensitive financial data does not leave the corporate network via email or cloud storage. Which of the following would BEST accomplish this goal?
#2. An attacker is attempting to gain persistent access to a target system by hiding malicious code in a location that is difficult to detect and remove. Which of the following attack techniques is the attacker MOST likely using?
#3. An analyst in a SOC notices a spike in DNS traffic going to multiple external IP addresses with randomly generated subdomains. What type of malicious activity is MOST likely occurring?
#4. A company recently moved several services to a public cloud provider. Security leadership is concerned about ensuring data confidentiality while it’s stored remotely. Which technology should the security team prioritize?
#5. A security administrator is reviewing access logs and notices that a terminated employee’s credentials were used to access internal resources two days after their departure. Which of the following processes was MOST likely overlooked?
#6. An attacker uses a compromised web server to trick users into entering their login credentials on a fake page. The URL is nearly identical to the real one but has a minor spelling difference. What type of attack is this?
#7. An analyst is configuring a web application firewall (WAF) to block known bad traffic. They want the WAF to detect SQL injection and cross-site scripting attempts. Which WAF capability should be enabled?
#8. A cloud security engineer is reviewing security policies for Infrastructure as Code (IaC) deployments. The goal is to prevent unauthorized changes and ensure consistent secure configurations. Which of the following practices should the engineer implement FIRST?
#9. A security analyst detects abnormal behavior from a user account, including logins from two geographically distant locations within minutes. Which of the following should the analyst consider as the NEXT step?
#10. A security administrator is reviewing mobile device policies for a bring-your-own-device (BYOD) environment. They want to ensure corporate data is protected without overly restricting personal use. Which of the following technologies BEST meets this requirement?
Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.
To view CompTIA Security+ practice tests on other days, click here.To view answers for today’s questions, expand the Answers accordion below.
Answers
- A
- B
- A
- D
- C
- C
- C
- B
- D
- A