CompTIA Security+ Practice Test of the Day 091225

Welcome to today’s CompTIA Security+ practice test!

This practice test uses our new UI!

Today’s practice test is based on Subdomain 2.2 (Explain common threat vectors and attack surfaces) from the CompTIA Security+ SY0-701 objectives.

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, nor are they brain dumps, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To choose CompTIA Security+ practice tests based on specific domains/subdomains, click that link.

Recommended read: Ultimate CompTIA Security+ Study Guide (2026)

CompTIA Security+ Practice Test of the Day 091225
10 questions • Single best answer
Question 1
An attacker calls the HR department claiming to be an IT auditor who needs the employee directory and org chart for a compliance review. Using a calm, authoritative tone and plausible details, he convinces HR to email the files. Which social engineering technique is MOST specifically described?
    Question 2
    An attacker creates a website at 'support-amazon-help.com' that mimics Amazon's customer service portal in appearance and branding. Victims who land on the site are prompted to enter their Amazon credentials and payment information. Which attack technique BEST describes this?
      Question 3
      A threat actor creates and distributes fabricated news articles claiming a publicly traded company's CEO was arrested for fraud, causing investors to panic-sell shares and driving the stock price down significantly. Which threat vector does this represent?
        Question 4
        An attacker enters a company's office dressed as a delivery driver and convinces a receptionist to allow access to the server room to 'deliver equipment.' Once inside, he plugs a rogue device into the network. Which human vector technique did the attacker PRIMARILY use?
          Question 5
          A security team discovers that several employee laptops were compromised when they connected to open Wi-Fi at a coffee shop. An attacker had set up an access point with the same network name as the coffee shop's legitimate Wi-Fi. Which threat vector does this represent?
            Question 6
            A vulnerability scan reveals that a company's internet-facing server has TCP port 23 (Telnet) open and actively listening. Telnet transmits all data in cleartext and was not intentionally enabled by the current team. Which attack surface does this represent?
              Question 7
              A security team evaluates two endpoint monitoring approaches. Option A installs a lightweight agent on each workstation to collect telemetry. Option B uses network-level analysis that requires no software on endpoints. Which distinction in threat vector coverage is MOST relevant to this choice?
                Question 8
                A threat intelligence report reveals that an attacker compromised a hardware manufacturer's firmware update process, embedding malicious code in updates distributed to customers before the tampering was discovered. Which threat vector does this represent?
                  Question 9
                  A security analyst receives a report of a malicious PDF circulating via email. The PDF exploits a vulnerability in the PDF reader to execute code when opened, silently installing malware without the user's knowledge. Which threat vector does this represent?
                    Question 10
                    A security researcher demonstrates that a Bluetooth-enabled medical device can be attacked from up to 30 feet away, allowing an attacker to intercept its communications and send unauthorized commands. Which attack surface does this represent?
                      Desk Mat CTA Block
                      Cybersecurity Acronyms Desk Mat

                      Tired of Googling acronyms while practicing/studying?
                      Keep them all under your keyboard.

                      📋 GET_THE_DESK_MAT

                      Take more CompTIA Security+ practice tests

                      Leave a Comment

                      Your email address will not be published. Required fields are marked *

                      Scroll to Top