CCST Cybersecurity Practice Test 3

CCST Cybersecurity Practice Tests

1 / 25

A hacker exploits a vulnerability in outdated software before a patch is released. What type of attack is this?

2 / 25

A security team is configuring a company’s SIEM (Security Information and Event Management) system to detect unusual login attempts from foreign countries outside of business hours. What security concept does this best represent?

3 / 25

A user downloads a seemingly harmless PDF file, but upon opening it, the system starts behaving abnormally, and security tools detect unauthorized data exfiltration. What type of attack does this scenario describe?

4 / 25

A cybersecurity team notices a large amount of outbound traffic to an unknown IP address from a compromised system. The forensic analysis reveals a hidden process communicating with a remote command-and-control server. What type of malware is likely responsible?

5 / 25

An attacker successfully injects malicious SQL commands into a login field, gaining unauthorized access to a database. What was most likely missing in the web application’s security controls?

6 / 25

What should an organization do before allowing employees to work remotely?

7 / 25

What security measure helps prevent unauthorized physical access to a server room?

8 / 25

Which security principle ensures that data is protected from unauthorized modification?

9 / 25

A security analyst notices an unauthorized connection to an internal database. What is the best immediate action?

10 / 25

What attack floods a target system with traffic to overwhelm and disrupt its normal operations?

11 / 25

Which of the following is a secure method of storing passwords in an enterprise environment?

12 / 25

A cybersecurity professional wants to test a company's defenses by simulating an attack. What is this process called?

13 / 25

An attacker eavesdrops on network traffic to capture usernames and passwords. What type of attack is this?

14 / 25

What authentication method requires a user to verify their identity using two or more factors?

15 / 25

A company wants to monitor traffic in real time and detect cyber threats before they cause harm. What security tool should they use?

16 / 25

What is the main purpose of patch management in cybersecurity?

17 / 25

Which type of malware encrypts a user’s files and demands payment for decryption?

18 / 25

What is the primary benefit of using a VPN (Virtual Private Network) for remote employees?

19 / 25

A user receives a pop-up warning that their system is infected with malware and must install a specific program to remove it. What type of attack is this?

20 / 25

A company implements an intrusion prevention system (IPS) on its network. What is the primary function of this security device?

21 / 25

What type of attack involves sending fraudulent emails that appear to come from a legitimate source, tricking users into revealing sensitive information?

22 / 25

A company wants to prevent unauthorized devices from connecting to its corporate Wi-Fi network. Which security control is best suited for this?

23 / 25

Which security principle ensures that users can only access the minimum resources needed to perform their job functions?

24 / 25

A user reports that their web browser frequently redirects them to unfamiliar websites, and pop-ups appear even when no browser is open. What is the most likely cause?

25 / 25

A network administrator notices multiple failed login attempts on an administrator account from an external IP address. What is the best immediate action to take?

Your score is

The average score is 0%

0%