CompTIA CySA+ Practice Test

CompTIA CySA+ Practice Test

CompTIA CySA Practice Test

1 / 30

After a DDoS attack, you’re briefing executives. Which metric best demonstrates impact?

2 / 30

A penetration test flags weak passwords. Which policy should you enforce to mitigate this?

3 / 30

A network scan reveals an unknown device. Which tool confirms its OS and services?

4 / 30

A malware outbreak is detected on a workstation. Which command captures live memory for forensic analysis?

5 / 30

A scan identifies an outdated Apache version (2.4.29) with CVE-2019-0211. What’s the first remediation step?

6 / 30

A SIEM alert flags repeated login failures. Which command investigates the source on a Linux server?

7 / 30

A stakeholder requests a report on a recent phishing incident. Which element should you prioritize to ensure clarity?

8 / 30

During a ransomware attack, a system is isolated. Which step should follow to determine the attack vector?

9 / 30

A vulnerability scan reveals a critical SQL injection flaw on a web server. Which tool should you use to validate this finding manually?

10 / 30

A SOC analyst notices unusual outbound traffic from a server. Which command should they use to identify the process initiating the connections?

11 / 30

Which of these is NOT considered a common indicator when analyzing vulnerability-assessment tool output?

12 / 30

Which framework can assist in defining consistent scanning and remediation policies across an organization?

13 / 30

During a scan, a critical infrastructure device forbids the scanner due to sensitive configuration. How should you proceed?

14 / 30

Which scanning approach would you use to identify outdated or vulnerable services running on cloud-based infrastructure without installing agents?

15 / 30

Which control type helps reduce risk from unpatched or end-of-life software when patching is not immediately possible?

16 / 30

After a vulnerability scan, multiple low-severity flaws are found across many systems. What should guide the remediation priority?

17 / 30

Which type of vulnerability scanning is most suitable for detecting misconfigurations in developed web applications?

18 / 30

If a newly released zero-day vulnerability has no patch yet, what is the BEST interim mitigation measure?

19 / 30

What does a high Common Vulnerability Scoring System (CVSS) base score typically indicate about a vulnerability?

20 / 30

When planning a vulnerability scan across a corporate network, which scanning method is LEAST likely to miss internal-only vulnerabilities?

21 / 30

Why is understanding both host-based and network-based data important when investigating suspicious activity?

22 / 30

Which identity and access management (IAM) control reduces risk of compromised credentials being misused within an enterprise?

23 / 30

When monitoring network traffic, which pattern might indicate beaconing behavior from malware?

24 / 30

What is the primary advantage of integrating a SOAR (Security Orchestration, Automation, and Response) platform in a SOC workflow?

25 / 30

Which of the following is a host-based indicator of potentially malicious activity?

26 / 30

In a SIEM environment, why is log ingestion and normalization important before analysis?

27 / 30

Which mechanism is commonly used to protect sensitive data in transit and support secure communications?

28 / 30

Which architecture model helps contain trust boundaries and reduces risk across cloud and on-premises environments?

29 / 30

You notice unusual outbound traffic from an endpoint late at night, to an external IP not associated with normal business activity. What is your BEST next step?

30 / 30

Which of these is the MOST important reason to ensure time synchronization across all systems in a security monitoring environment?

Your score is

The average score is 76%

0%