Welcome to today’s CompTIA Security+ practice test!

This practice test uses our new UI!

Today’s practice test is based on Subdomain 2.3 (Explain various types of vulnerabilities.) from the CompTIA Security+ SY0-701 objectives.

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, nor are they brain dumps, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To choose CompTIA Security+ practice tests based on specific domains/subdomains, click that link.

Recommended read: Ultimate CompTIA Security+ Study Guide (2026)

CompTIA Security+ Practice Test of the Day 260307
10 questions • Single best answer
Question 1
A penetration tester is reviewing the source code of a custom web application deployed at a regional healthcare network. During the review, she notices that the application constructs database queries by directly concatenating user-supplied form input without any sanitization or parameterization. When she submits a single quote character into the patient search field, the application returns a verbose database error message revealing the underlying table structure. The application is running on a production server accessible from the public internet. What type of vulnerability has the penetration tester identified?
    Question 2
    A security analyst is reviewing logs from a Linux web server that hosts a financial reporting application. She notices that a process launched by the web server user account briefly accessed a configuration file owned by root, read its contents successfully, and then was denied access when it attempted the same operation 400 milliseconds later after a permission check was completed. The web server software had not been modified, and no patches are pending. Which vulnerability type BEST describes what the analyst has identified?
      Question 3
      During a red team engagement at a large manufacturing company, an attacker gains limited user-level access to a Windows workstation on the corporate network. The attacker identifies that a custom internal application runs as SYSTEM and periodically reads from a directory that the current user has write access to. The attacker places a specially crafted DLL file in that directory before the next scheduled execution of the application. Which vulnerability type is the attacker most likely exploiting?
        Question 4
        A security engineer at a software company discovers that one of the organization's mobile applications allows users to install third-party application packages directly from unofficial sources outside of the approved app store. The organization's MDM policy prohibits this behavior, but the feature has not been technically blocked on corporate-enrolled devices. An analyst confirms that several employees have installed unvetted applications using this method on their COPE devices. Which mobile device vulnerability BEST describes this situation?
          Question 5
          A cloud security architect reviews a recently deployed containerized microservices environment hosted on a public cloud platform. A developer reports that one of the container workloads was able to access environment variables and filesystem paths belonging to a different container running on the same underlying host. The containers are managed by a shared orchestration platform, and no explicit network communication occurred between them. Which vulnerability type does this scenario BEST represent?
            Question 6
            An analyst at a cybersecurity firm is reviewing vulnerability scan results for a client's enterprise environment. One of the flagged findings indicates that a network-connected HVAC controller embedded in the building management system is running firmware from 2014 and has no available vendor updates. The device vendor went out of business in 2019, and no patches have been issued since. The device is still actively monitoring environmental controls in a data center. Which TWO vulnerability types BEST describe the risks associated with this device? (Choose the answer option that captures both.)
              Question 7
              During a security assessment, a consultant discovers that an organization's internal developer portal accepts file uploads that are processed server-side. By uploading a PHP script disguised as an image file, the consultant is able to navigate directly to the uploaded file's URL and execute arbitrary commands on the web server. The application does not validate the MIME type or file extension on the server side, and the upload directory is within the web root. Which application vulnerability type does this scenario BEST represent?
                Question 8
                A threat intelligence analyst is reviewing a vendor advisory that describes a newly disclosed vulnerability in a widely used enterprise VPN client. The vendor has confirmed the vulnerability exists and is actively being exploited in the wild, but has not yet released a patch. The analyst's organization uses this VPN client across its entire remote workforce of 4,000 employees. Which vulnerability type BEST describes this situation from the perspective of SY0-701 objective 2.3?
                  Question 9
                  A developer at a financial technology company is conducting a code review of a legacy C++ application that handles wire transfer requests. She notices a function that copies user-supplied transaction reference strings into a fixed-size stack buffer using strcpy() without any length validation. During testing, she confirms that supplying a reference string longer than 256 characters causes the application to crash and overwrites the return address on the stack. Which application vulnerability type does this BEST represent?
                    Question 10
                    An enterprise architect is designing a new cloud-hosted SaaS platform and raises a concern about the use of a third-party authentication library that was last updated 18 months ago. A recently published CVE indicates that an older version of this library contains a flaw that allows authentication tokens to be forged under specific conditions. The development team has not yet assessed whether the version in use is affected, and the library is deeply embedded in the application codebase. Which combination of vulnerability types from SY0-701 objective 2.3 is MOST applicable to this scenario?
                      Desk Mat CTA Block
                      Cybersecurity Acronyms Desk Mat

                      Tired of Googling acronyms while practicing/studying?
                      Keep them all under your keyboard.

                      📋 GET_THE_DESK_MAT

                      Take more CompTIA Security+ practice tests

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *