Free CySA+ Practice Test

CySA+ Practice Test 7

CompTIA CySA Practice Test

1 / 10

During an incident, a legal hold is issued. What is the primary implication of a legal hold on evidence collection and data management?

2 / 10

What is the primary purpose of a "security baseline scan" in vulnerability management?

3 / 10

A security analyst is reviewing network traffic and observes an unusually large number of HTTP GET requests to a web server from a single source IP address within a very short timeframe. Which type of attack is MOST likely occurring?

4 / 10

An organization requires that all data at rest be encrypted. Which cryptographic solution is typically used to encrypt entire hard drives, protecting data even if the physical drive is stolen?

5 / 10

Which type of attack framework categorizes an adversary's actions during the phases of a cyberattack, from initial reconnaissance to actions on objectives?

6 / 10

A security analyst is evaluating the criticality of a newly discovered vulnerability. The analyst considers the potential impact if the vulnerability were exploited, but also whether exploit code is publicly available and how easily an attacker could leverage it. Which aspect of vulnerability prioritization is the analyst focusing on?

7 / 10

After a successful malware infection, a security analyst needs to ensure the malware is completely removed from the affected endpoint. Which recovery strategy is generally considered the MOST secure and ensures complete eradication, even if it causes more downtime?

8 / 10

A SIEM system is receiving a massive influx of logs from various sources, making it difficult to identify critical security events. Which log management concept helps reduce the volume of irrelevant data and focus on actionable security intelligence?

9 / 10

Which type of security assessment simulates a real-world attack by an adversary to test the effectiveness of an organization's security controls and incident response capabilities from an adversarial perspective?

10 / 10

A security analyst is investigating a suspected insider threat. The analyst identifies an employee consistently accessing sensitive customer data outside of normal business hours and from unusual geographic locations. Which behavior analytics technique is being applied?

Your score is

The average score is 81%

0%