CCST Cybersecurity Practice Test 5

CCST Cybersecurity Practice Tests

1 / 20

A company’s IT department has implemented a security measure to prevent unauthorized users from accessing its network by validating the identity of users and devices before allowing them to connect. What is this security measure called?

2 / 20

A company has implemented a security control to prevent unauthorized changes to critical system configurations by non-administrative users. What type of control is this?

3 / 20

A company experiences a data breach where attackers gain access to sensitive financial data. What is the first step the security team should take?

4 / 20

A security administrator notices that users are bypassing the organization's email filter by using encrypted email services. What action should the administrator take to address this issue?

5 / 20

A company needs to ensure that sensitive data is protected when transferred over the internet, preventing interception and tampering by attackers. What protocol should be used?

6 / 20

A network administrator needs to ensure that users on different network segments cannot communicate directly with each other without explicit permissions. What security measure should be used?

7 / 20

A hacker sends an email pretending to be from the company's CEO, requesting an urgent wire transfer. What type of attack is this?

8 / 20

A company wants to ensure that employees’ computers automatically install security patches as soon as they are available. What should they enable?

9 / 20

A cybersecurity analyst notices that an employee’s account has accessed multiple confidential files outside of normal working hours. What type of security threat could this indicate?

10 / 20

An attacker successfully installs a keylogger on a company workstation. What is the primary risk associated with this malware?

11 / 20

An organization needs to ensure that only authorized employees can access confidential files based on their job roles. What security model should they implement?

12 / 20

A security administrator wants to protect company laptops from malware infections when employees download files from the internet. What security measure should be implemented?

13 / 20

A security team detects that an attacker is attempting to access internal systems by using default administrator passwords. What security measure can prevent this?

14 / 20

A cybersecurity administrator needs to secure a company's wireless network by implementing strong authentication and encryption. Which wireless security protocol should they choose?

15 / 20

An attacker tricks a user into clicking a fake email link, which leads to a fraudulent login page designed to steal credentials. What type of attack is this?

16 / 20

A company wants to prevent employees from accessing malicious websites that could result in malware infections. What security measure should they implement?

17 / 20

An attacker gains access to an organization's internal network and uses a packet sniffer to capture unencrypted credentials transmitted over the network. What security measure could have prevented this attack?

18 / 20

A cybersecurity team wants to implement a system that monitors and blocks unauthorized access attempts based on predefined security policies. What type of security tool should they use?

19 / 20

A security analyst detects unusual outbound traffic from an internal server to an unknown external IP address. Further investigation reveals large amounts of data being sent without authorization. What type of attack is most likely occurring?

20 / 20

A company wants to secure its employees' login process by implementing an authentication method that verifies something they have, something they know, and something they are. What security control should they use?

Your score is

The average score is 0%

0%