Welcome to today’s CompTIA Security+ practice test!

This practice test uses our new UI!

Today’s practice test is based on subdomain 1.1 (Compare and contrast various types of security controls.) from the CompTIA Security+ SY0-701 objectives.

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, nor are they brain dumps, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To choose CompTIA Security+ practice tests based on specific domains/subdomains, click that link.

Recommended read: Ultimate CompTIA Security+ Study Guide (2026)

CompTIA Security+ Practice Test of the Day 260227
10 questions • Single best answer
Question 1
Your organization operates a hybrid cloud environment and recently experienced several failed login attempts against its VPN gateway. A security engineer implements a control that automatically locks user accounts after five unsuccessful login attempts within 10 minutes. The goal is to stop brute-force password attacks before they succeed. Which type of security control BEST describes this implementation?
    Question 2
    An analyst in a SOC observes that the company recently updated its security awareness policy to require employees to complete mandatory phishing training each quarter. The policy clearly outlines acceptable email use, reporting procedures, and consequences for noncompliance. The training has not yet been delivered, but employees have acknowledged receipt of the new requirements. Which category of security control does this policy BEST represent?
      Question 3
      A security administrator at a financial services company deploys a honeypot inside a segmented network zone that appears to contain sensitive financial records. The honeypot is designed to attract attackers and generate alerts when unauthorized access attempts occur. The system does not store actual customer data. Which type of control is the honeypot primarily classified as?
        Question 4
        Your company’s data center contains biometric scanners at entry points, mantraps between secure zones, and bollards positioned outside the building to prevent vehicle intrusion. These measures are intended to protect critical infrastructure and limit unauthorized physical access. Which category of security controls do these implementations BEST represent?
          Question 5
          An attacker is attempting to gain unauthorized access to a corporate office after business hours. The building has large warning signs indicating 24/7 video surveillance, perimeter fencing with locked gates, and visible security patrol vehicles parked near the entrance. The organization’s goal is to discourage intrusion attempts before they occur. Which type of security control is MOST clearly demonstrated in this scenario?
            Question 6
            Your company recently implemented full-disk encryption on all employee laptops. However, due to legacy application compatibility issues, encryption cannot be deployed on several older executive systems. Instead, the security team enforces strict physical security measures and enhanced monitoring on those specific devices to reduce risk. Which type of control BEST describes the alternative measures applied to the executive systems?
              Question 7
              A security administrator at a healthcare organization configures a system to automatically restore critical services from a known-good backup after a ransomware infection is detected and contained. The restoration process ensures systems are returned to normal operational status with minimal downtime. Which type of control does this automated restoration process BEST represent?
                Question 8
                An analyst in a SOC observes that the organization recently deployed a new endpoint detection and response (EDR) platform across all corporate workstations. The system continuously monitors system calls, logs suspicious activity, and generates alerts when anomalous behavior is detected. From a control category perspective, how should this EDR system be classified?
                  Question 9
                  A security administrator at a mid-sized company is reviewing recent audit findings. The audit revealed that although strong firewall rules are in place, there is no formal documentation assigning data ownership or defining who is responsible for approving access to sensitive financial systems. In response, leadership formally assigns data owners and establishes written procedures for approving and reviewing access rights. Which category of security control BEST describes assigning data ownership and formalizing approval procedures?
                    Question 10
                    Your organization operates a remote workforce and enforces a policy requiring employees to use company-issued VPN software when accessing internal resources. The VPN client is configured to automatically disconnect users who attempt to split-tunnel traffic outside the encrypted session, thereby ensuring all corporate traffic passes through secure monitoring systems. Which type of control is the automatic VPN disconnection feature BEST classified as?
                      Desk Mat CTA Block
                      Cybersecurity Acronyms Desk Mat

                      Tired of Googling acronyms while practicing/studying?
                      Keep them all under your keyboard.

                      📋 GET_THE_DESK_MAT

                      Take more CompTIA Security+ practice tests

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *