Welcome to today’s CompTIA Security+ practice test!

This practice test uses our new UI!

Today’s practice test is based on subdomain 1.3 (Explain the importance of change management processes and the impact to security.) from the CompTIA Security+ SY0-701 objectives.

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, nor are they brain dumps, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To choose CompTIA Security+ practice tests based on specific domains/subdomains, click that link.

Recommended read: Ultimate CompTIA Security+ Study Guide (2026)

CompTIA Security+ Practice Test of the Day 260303
10 questions β€’ Single best answer
Question 1
A security administrator at a regional bank is preparing to deploy a critical patch to the organization's core banking application. Before the change can proceed, the administrator must route the request through multiple stakeholders, including the IT manager, application owner, and compliance officer. Each party must review the potential impact and formally approve the change before it is scheduled. The process feels time-consuming to the team, but the security administrator understands its importance. Which component of the change management process is being described in this scenario?
    Question 2
    Your organization recently completed a major upgrade to its customer-facing web application. After deployment, the development team noticed that a dependent authentication service began behaving unexpectedly, causing intermittent login failures for end users. A post-incident review determined that the team had not fully accounted for how changes to the web application would affect integrated services prior to initiating the upgrade. Which change management concept, if properly applied, would most likely have prevented this issue?
      Question 3
      A change management board (CAB) at a healthcare organization approves a configuration change to the network firewall. After the change is implemented over the weekend, a network engineer updates the firewall ruleset diagram to reflect the new allow and deny rules. The organization's change management policy requires this step to be completed within 24 hours of any approved change. Which change management documentation requirement is the engineer fulfilling?
        Question 4
        A systems administrator submits a change request to remove a legacy middleware application from a production server. The application was originally installed to support a third-party integration that was discontinued two years ago. During the review process, a senior engineer warns that removing the middleware without proper testing could break a payroll reporting tool that the finance team still uses quarterly. The CAB asks for additional analysis before approving the change. Which change management concept is the senior engineer raising concern about, and which process step should be completed before the change proceeds?
          Question 5
          An analyst in a SOC observes that an emergency patch was applied to a critical database server late Friday evening by an on-call engineer. The engineer completed the patch successfully and verified service availability, but no ticket was created, no approval was obtained, and no record of the change exists in the organization's change management system. The following Monday, a different team member attempts to troubleshoot unrelated database latency and is unaware any changes were made over the weekend. Which two change management failures are BEST illustrated by this scenario? (Choose the answer that captures both.)
            Question 6
            The IT department at a financial services firm is preparing to upgrade a critical payment processing application from a version that is nearing vendor end-of-life. The security team has flagged this as a technical implication of the change, noting that the older version will soon stop receiving security patches. During the planning phase, the team also identifies that the upgrade will require a full restart of the application and a brief period where the service will be unavailable. Which two technical implications of change management does this scenario BEST illustrate?
              Question 7
              A penetration tester discovers that a recently patched web server still exhibits a vulnerability that was reportedly fixed three weeks ago. Upon investigation, the security team learns that while the patch was applied in the staging environment, the change was never promoted to production. The organization's change management records show the patch was marked 'complete' in the ticketing system shortly after the staging deployment, with no verification step recorded. Which change management failure BEST explains why the production server remained vulnerable?
                Question 8
                The CISO of a mid-sized manufacturing company is reviewing the organization's change management policy after a failed software rollout caused four hours of production downtime. A post-mortem reveals that the change was deployed during peak business hours, no rollback procedure had been prepared, and multiple teams were unaware the change was happening. The CISO wants to update the policy to prevent similar incidents. Which THREE change management elements should the CISO prioritize adding or enforcing? (Choose the answer that captures the three most relevant.)
                  Question 9
                  A security engineer at a cloud-native company is tasked with updating the organization's firewall allow list to permit traffic from a newly contracted third-party API provider. The engineer makes the change directly in the production environment without going through the formal change management process, reasoning that it is a minor, low-risk modification. Two days later, an overly broad rule accidentally introduced during the update allows inbound traffic from unexpected IP ranges. Which change management principle does this scenario MOST clearly demonstrate the importance of?
                    Question 10
                    A systems administrator at a university is preparing to roll back a recent Group Policy update after discovering it has broken VPN authentication for remote faculty. The administrator has identified the previous policy settings and is ready to restore them, but realizes that no formal procedure for reverting this specific change was documented when the original update was approved. Which change management element, had it been properly created before the initial Group Policy change was deployed, would have provided the administrator with a structured path to recover?
                      Desk Mat CTA Block
                      Cybersecurity Acronyms Desk Mat

                      Tired of Googling acronyms while practicing/studying?
                      Keep them all under your keyboard.

                      πŸ“‹ GET_THE_DESK_MAT

                      Take more CompTIA Security+ practice tests

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *