CCST Cybersecurity Practice Test 4

CCST Cybersecurity Practice Tests

1 / 20

A security analyst is reviewing logs and notices multiple login attempts from different locations in a short time frame on a user account. What is the best immediate action?

2 / 20

A cybersecurity team detects that an attacker has exploited an unpatched vulnerability in a web application to execute malicious SQL commands. What type of attack is this?

3 / 20

A security administrator needs to ensure that employees cannot reuse their last five passwords when changing their credentials. What security control should they enforce?

4 / 20

Which type of malware disguises itself as a legitimate program but secretly performs malicious actions?

5 / 20

A company needs to encrypt email communications between employees to ensure confidentiality. What protocol should they use?

6 / 20

Which security framework focuses on the principle of “Never trust, always verify”?

7 / 20

An employee receives a fake invoice email appearing to be from a known supplier, instructing them to send payment to a fraudulent account. What type of scam is this?

8 / 20

What type of attack relies on misleading users into clicking on disguised malicious links or buttons?

9 / 20

A company implements a security solution that uses behavioral analysis to detect unusual activity on an endpoint. What type of solution is this?

10 / 20

Which security measure helps protect against ransomware attacks?

11 / 20

A hacker intercepts communication between two parties and modifies the data before forwarding it to the intended recipient. What is this type of attack called?

12 / 20

A security team wants to ensure that employees use unique, complex passwords for each online service. What security measure should they recommend?

13 / 20

An attacker uses a rogue access point to intercept data from devices connecting to a public Wi-Fi network. What type of attack is this?

14 / 20

What type of encryption is commonly used for securing web traffic using HTTPS?

15 / 20

A user downloads a free software tool from an unverified website, and later, the computer starts sending out mass spam emails. What type of malware is likely responsible?

16 / 20

What is the primary security risk associated with a misconfigured firewall rule that allows inbound traffic from any IP address?

17 / 20

Which security measure helps prevent brute-force attacks on login pages?

18 / 20

A security analyst observes that a system process has escalated its privileges without proper authentication. What type of attack might be occurring?

19 / 20

An attacker sends an email that appears to be from a trusted colleague, asking the recipient to log into a fake portal that steals credentials. What kind of attack is this?

20 / 20

A company wants to implement a solution to monitor network traffic for real-time threat detection and automatically respond to potential attacks. Which technology should they use?

Your score is

The average score is 0%

0%