CompTIA Security+ Practice Test of the Day 260508

Welcome to today’s CompTIA Security+ practice test!

This practice test uses our new UI!

Today’s practice test is based on Subdomain 4.1 (Given a scenario, apply common security techniques to computing resources) from the CompTIA Security+ SY0-701 objectives.

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, nor are they brain dumps, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To choose CompTIA Security+ practice tests based on specific domains/subdomains, click that link.

Recommended read: Ultimate CompTIA Security+ Study Guide (2026)

CompTIA Security+ Practice Test of the Day 260508
10 questions • Single best answer
Question 1
A security engineer building a cloud-hosted application platform must ensure all instances adhere to the organization's minimum security requirements from the moment they are provisioned. Management wants a repeatable, consistent approach across all deployments. What should the engineer do FIRST?
    Question 2
    A security analyst discovers dozens of IoT sensors recently added to a manufacturing plant's production floor are still using factory-default credentials and have no patch management process in place. Which hardening action addresses the MOST critical vulnerabilities?
      Question 3
      Employees at a hybrid organization use personal smartphones to access corporate email and cloud storage. The security team cannot enforce policies on unowned devices, but the CISO wants control over work applications without requiring corporate device ownership. Which mobile deployment model BEST fits this?
        Question 4
        A law firm's network administrator is replacing WPA2-Personal, which relies on a shared passphrase vulnerable to offline dictionary attacks. The administrator is evaluating WPA3 to improve authentication strength. Which WPA3 feature provides the MOST significant security improvement over WPA2-Personal?
          Question 5
          Attackers have been distributing tampered versions of tools similar to one a cybersecurity firm distributes to customers. The development team wants customers to verify the authenticity and integrity of the software before installation. Which application security control BEST addresses this requirement?
            Question 6
            A water treatment facility is integrating ICS with a plant management network. A security assessment finds the ICS components run proprietary firmware that cannot receive OS patches. Which combination of compensating controls BEST mitigates the risk from these unpatched systems?
              Question 7
              A penetration tester demonstrates that session tokens in a banking app's cookies can be read by injected JavaScript, enabling XSS-based session hijacking. The development team needs an immediate fix that prevents client-side scripts from accessing cookie values. Which control BEST addresses this?
                Question 8
                A SOC team receives a suspicious executable as an email attachment. They need to observe its runtime behavior — network connections, registry changes, and files created — without exposing production systems. Which technique BEST supports safe analysis?
                  Question 9
                  A network engineer reviewing layer-2 switching infrastructure finds all ports are on VLAN 1, management interfaces use Telnet instead of SSH, and many unused ports are enabled. Which hardening action addresses the GREATEST security risk and should be prioritized first?
                    Question 10
                    A security team managing 500 workstations needs real-time visibility to detect configuration drift, identify unauthorized software, and capture host-based events for investigation — all simultaneously. Which monitoring approach BEST satisfies all three requirements?
                      Desk Mat CTA Block
                      Cybersecurity Acronyms Desk Mat

                      Tired of Googling acronyms while practicing/studying?
                      Keep them all under your keyboard.

                      📋 GET_THE_DESK_MAT

                      Take more CompTIA Security+ practice tests

                      Leave a Comment

                      Your email address will not be published. Required fields are marked *

                      Scroll to Top