Welcome to today’s CompTIA Security+ practice test!

This practice test uses our new UI!

Today’s practice test is based on subdomain 4.1 (Given a scenario, apply common security techniques to computing resources.) from the CompTIA Security+ SY0-701 objectives.

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, nor are they brain dumps, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To choose CompTIA Security+ practice tests based on specific domains/subdomains, click that link.

Related post: How to Secure IoT Devices – A Best Practices Guide

CompTIA Security+ Practice Test of the Day 260214
10 questions • Single best answer
Question 1
A security administrator at a mid-sized company is tasked with deploying a standardized configuration for all newly imaged Windows workstations in a hybrid environment. The organization wants systems securely configured before production and deviations detected over time. Which should be implemented FIRST?
    Question 2
    Your organization allows remote employees to use personal smartphones to access corporate email and internal applications. A device containing sensitive data was lost. Management wants encryption enforcement, remote wipe, and compliance validation. Which solution best addresses this?
      Question 3
      An analyst in a SOC observes wireless connectivity issues after a new access point deployment. The organization wants optimal placement and reduced signal leakage. What should be performed?
        Question 4
        Your company deploys a web-based application handling financial data. A security assessment shows lack of input validation, enabling malicious script execution. What should be implemented?
          Question 5
          An administrator is hardening Linux servers and wants to reduce the attack surface by limiting exposed services. What is the BEST action?
            Question 6
            Your organization operates ICS devices with outdated firmware. The vendor released updates addressing vulnerabilities. What should be implemented?
              Question 7
              A security administrator wants only approved applications to execute on corporate laptops after unauthorized installations were discovered. Which control should be implemented?
                Question 8
                An enterprise wants to isolate suspicious applications to observe behavior without risking production systems. Which solution should be implemented?
                  Question 9
                  Your company is deploying COPE mobile devices and wants corporate data separated from personal data while maintaining control over corporate applications. Which feature best supports this?
                    Question 10
                    An administrator wants wireless authentication integrated with centralized identity management and individual user accountability instead of a shared key. Which configuration best meets this requirement?

                      Take more CompTIA Security+ practice tests

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *