CompTIA Security+ Practice Test of the Day 260509

Welcome to today’s CompTIA Security+ practice test!

This practice test uses our new UI!

Today’s practice test is based on Subdomain 4.2 (Explain the security implications of proper hardware, software, and data asset management) from the CompTIA Security+ SY0-701 objectives.

This beginner-level practice test is inspired by the CompTIA Security+ (SY0-701) exam and is designed to help you reinforce key cybersecurity concepts on a daily basis.

These questions are not official exam questions, nor are they brain dumps, but they reflect topics and scenarios relevant to the Security+ certification. Use them to test your knowledge, identify areas for improvement, and build daily cybersecurity habits.

Note: CompTIA and Security+ are registered trademarks of CompTIA. This content is not affiliated with or endorsed by CompTIA.

To choose CompTIA Security+ practice tests based on specific domains/subdomains, click that link.

Recommended read: Ultimate CompTIA Security+ Study Guide (2026)

CompTIA Security+ Practice Test of the Day 260509
10 questions • Single best answer
Question 1
A county agency is sourcing laptops from three vendors. One offers lower prices but sources components from an unverified overseas manufacturer. The security team must evaluate this vendor before approval. What is the PRIMARY security concern with this vendor?
    Question 2
    A financial institution just deployed 300 new workstations. The IT governance team is updating the asset management system and must record a named owner for each device before deployment. Which outcome does assigning an asset owner PRIMARILY achieve?
      Question 3
      A security team discovers unclassified files on shared network drives, including HR reviews, customer contracts, and regulated financial data. Management wants classification labels applied before enforcing access controls. What is the PRIMARY reason for classifying data assets?
        Question 4
        During a security audit of a regional bank, the auditor finds several servers actively processing transactions that are not listed in the asset inventory. No one knows when they were provisioned or who owns them. What is the MOST significant security risk?
          Question 5
          An enterprise security team has finished a physical hardware inventory. They now want to discover all installed software across endpoints to identify unauthorized and end-of-life applications. Which asset management activity BEST describes what the team is performing?
            Question 6
            A state agency is donating 150 decommissioned laptops to public schools. The spinning hard drives previously stored social security numbers and tax records. The drives will be reused. Which sanitization method is MOST appropriate?
              Question 7
              A cybersecurity team is decommissioning servers whose SSDs stored encryption keys, credentials, and regulated PII. Per policy, media containing sensitive data that will not be reused must be permanently destroyed. Which disposal method is MOST appropriate?
                Question 8
                An organization decommissioned servers holding protected health information and hired a certified vendor to destroy the data. The compliance officer now needs formal documentation to satisfy a HIPAA audit. What document should the vendor provide?
                  Question 9
                  A healthcare organization must retain patient records for seven years per state law. The IT security team is implementing controls to enforce this across all storage systems. Which statement BEST explains why a formal data retention policy is a critical security control?
                    Question 10
                    A security audit finds that 75 replaced workstations are sitting in a warehouse, still joined to the domain, containing unencrypted trade secrets, and never formally processed. The employees who used them left six months ago. Which asset lifecycle phase was MOST neglected?
                      Desk Mat CTA Block
                      Cybersecurity Acronyms Desk Mat

                      Tired of Googling acronyms while practicing/studying?
                      Keep them all under your keyboard.

                      📋 GET_THE_DESK_MAT

                      Take more CompTIA Security+ practice tests

                      Leave a Comment

                      Your email address will not be published. Required fields are marked *

                      Scroll to Top