Welcome to today’s CompTIA Security+ practice test!

This practice test uses our new UI!

Today’s practice test is based on Subdomain 2.2 (Explain common threat vectors and attack surfaces.) from the CompTIA Security+ SY0-701 objectives.

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, nor are they brain dumps, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To choose CompTIA Security+ practice tests based on specific domains/subdomains, click that link.

Recommended read: Ultimate CompTIA Security+ Study Guide (2026)

CompTIA Security+ Practice Test of the Day 260306
10 questions • Single best answer
Question 1
A penetration tester is conducting a social engineering assessment against a regional healthcare organization. During the reconnaissance phase, the tester registers a domain name that closely resembles the target company's legitimate domain — specifically, substituting the letter 'o' with the number '0' in the organization's name. Employees who mistype the URL in their browser are redirected to a convincing replica of the company's internal portal login page. The tester is able to harvest credentials from three employees within the first hour of the campaign. Which attack technique does this scenario BEST describe?
    Question 2
    An analyst in a SOC is reviewing email gateway logs and notices that several employees received messages purportedly from the company's CFO requesting urgent wire transfers. The sender's display name matches the CFO's name exactly, but the actual sending domain is a third-party webmail provider. The messages include a plausible narrative about a confidential acquisition that must close by end of business. No malware or malicious links are present in the emails. Which threat vector does this attack scenario BEST represent?
      Question 3
      Your organization recently deployed a new customer-facing web application. During a post-launch security review, a security engineer discovers that the application's contact form does not sanitize user input before passing it to the backend database. A threat actor who is aware of this flaw could potentially manipulate database queries by injecting specially crafted input through the form. Beyond fixing the underlying vulnerability, the security team wants to identify which attack surface elements contributed to this exposure. Which of the following BEST describes the attack surface element most directly exploited in this scenario?
        Question 4
        A threat actor is targeting employees at a large financial services firm by sending text messages that appear to come from the company's IT helpdesk. The messages claim that the employee's VPN access will be suspended within 24 hours unless they click a link and re-verify their credentials. Several employees comply, unknowingly submitting their credentials to a spoofed login page. Which attack technique is BEST illustrated by this scenario?
          Question 5
          A security researcher is investigating a compromised e-commerce platform. After analyzing server logs, the researcher determines that attackers initially gained access by exploiting a vulnerability in a third-party inventory management plugin used by the platform. The plugin vendor had released a patch weeks earlier, but the organization's update process had not been applied. The attacker used this foothold to eventually exfiltrate customer payment data. Which attack surface category does the INITIAL point of compromise BEST represent?
            Question 6
            During a red team engagement at a manufacturing company, a tester notices that several Wi-Fi access points in the facility are broadcasting using WPA2 with a weak, organization-wide pre-shared key that has never been changed since initial deployment. Additionally, multiple IoT-enabled floor sensors and PLCs on the same wireless segment were found to be using factory-default usernames and passwords. The red team successfully moves laterally from a compromised sensor to a workstation on the corporate network. Which TWO attack surface elements were MOST directly exploited in this scenario? (Choose the answer that captures both elements.)
              Question 7
              An attacker is attempting to compromise a mid-sized logistics company by targeting employees who regularly visit a niche trucking industry forum. The attacker identifies the forum as a site frequently used by the company's fleet operations team, compromises the forum's web server, and embeds malicious JavaScript that exploits a browser vulnerability to silently install a remote access trojan on visitors' machines. The logistics company's security team had no direct relationship with or visibility into the forum's security posture. Which threat vector BEST describes the technique used by the attacker?
                Question 8
                A security administrator at a healthcare organization is reviewing the results of a recent threat assessment. The assessment identified that an employee in the billing department was deceived into transferring patient records to an external party after receiving a phone call from someone claiming to be an auditor from the organization's health insurance partner. The caller provided convincing details about an ongoing compliance audit, including the employee's name, department, and their manager's name. No technical vulnerabilities were exploited. Which human vector/social engineering technique BEST describes this attack?
                  Question 9
                  The CISO of a financial institution is conducting a threat surface review following a series of industry-wide attacks. Intelligence reports indicate that adversaries have been targeting managed service providers (MSPs) that handle IT operations for multiple financial firms simultaneously, then leveraging the MSPs' privileged remote access tools to pivot into client environments without triggering traditional alerting. The CISO wants to categorize this threat for the organization's risk register. Which attack surface category from the SY0-701 framework BEST describes this threat?
                    Question 10
                    A user at a logistics firm reports receiving a voicemail from what appeared to be their bank's fraud department, warning them of suspicious activity on their account and directing them to call back an 800 number immediately. When the user calls the number, an automated system asks them to enter their full account number, PIN, and the last four digits of their Social Security Number to 'verify their identity and unfreeze the account.' The phone number used legitimate caller ID spoofing to display the actual bank's toll-free number. Which social engineering technique BEST describes this attack?
                      Desk Mat CTA Block
                      Cybersecurity Acronyms Desk Mat

                      Tired of Googling acronyms while practicing/studying?
                      Keep them all under your keyboard.

                      📋 GET_THE_DESK_MAT

                      Take more CompTIA Security+ practice tests

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *