CCST Cybersecurity Practice Test 2

CCST Cybersecurity Practice Tests

1 / 25

A company deploys a Security Information and Event Management (SIEM) system to detect anomalies in its network traffic. One alert indicates multiple failed login attempts on a privileged account followed by a successful login from an IP address outside the company's usual geographic locations. What should the security team do first?

2 / 25

A penetration tester is attempting to exploit a company's internal network. After gaining low-level access to an employee's machine, they extract cached credentials and attempt to use them to access other network resources with higher privileges. This attack is an example of what technique?

3 / 25

A company's CEO receives an email appearing to be from a trusted business partner, urging immediate transfer of funds due to an "urgent contract issue." The email is well-crafted, does not contain malware, and appears highly convincing. The CEO almost falls for it but consults the cybersecurity team first. What type of attack is this?

4 / 25

A financial institution's security team notices a sudden increase in outgoing encrypted traffic from a workstation. The user denies any knowledge of the activity. Upon investigation, analysts discover that the computer is connecting to multiple foreign IP addresses, sending encrypted data. What type of attack is most likely occurring?

5 / 25

A cybersecurity analyst is investigating a suspected Advanced Persistent Threat (APT) on a corporate network. The attacker has been inside the network for several months, stealthily exfiltrating data and avoiding detection by using legitimate administrative tools. What is the most effective method to detect and mitigate this attack?

6 / 25

An attacker successfully encrypts a company’s files and demands payment for the decryption key. What type of attack is this?

7 / 25

A network administrator wants to monitor and detect suspicious activity on a company's network. What security solution should be used?

8 / 25

A cybersecurity team implements role-based access control (RBAC). What is the main purpose of this security measure?

9 / 25

A user is tricked into installing a fake antivirus program that demands payment to remove nonexistent threats. What type of malware is this?

10 / 25

A hacker gains administrator privileges on a network by exploiting a software vulnerability. What type of attack is this?

11 / 25

A company wants to ensure that only authorized users can access critical systems. What security measure should be implemented?

12 / 25

A security analyst is investigating an attack where an attacker intercepts communication between two parties without their knowledge. What type of attack is this?

13 / 25

A company wants to prevent unauthorized access to their Wi-Fi network. What is the most secure method?

14 / 25

A company's security team notices a large volume of traffic overwhelming their web server, making it inaccessible to users. What attack is this?

15 / 25

A security team uses penetration testing to evaluate their network defenses. What is the main goal of this test?

16 / 25

An attacker sends a fake email appearing to be from a trusted source to trick an employee into clicking a malicious link. What is this technique called?

17 / 25

A security team is implementing a zero-trust model. What does this approach emphasize?

18 / 25

A user reports their computer is running slow, and a security scan detects a program capturing their keystrokes. What type of malware has infected their system?

19 / 25

A company implements biometric authentication for access to sensitive data. What is the main advantage of this method?

20 / 25

A hacker disguises malicious software as a legitimate application to trick users into installing it. What type of attack is this?

21 / 25

A cybersecurity analyst notices a user's account has accessed sensitive files at unusual hours from an unfamiliar location. What is the best course of action?

22 / 25

A company wants to ensure that data sent over the internet is not intercepted or modified. What security principle should be applied?

23 / 25

A cybersecurity analyst is investigating a malware infection that spreads without user interaction and exploits system vulnerabilities. What type of malware is this?

24 / 25

A company's security logs show multiple failed login attempts from different locations worldwide in a short period. What does this indicate?

25 / 25

An employee receives a phone call from someone claiming to be from the IT department, requesting their login credentials to fix an urgent issue. What type of attack is this?

Your score is

The average score is 0%

0%