Skip to main content

CySA+ Practice Test (V3)

Dive into practice questions

Question 1

A cybersecurity analyst is doing triage in a SIEM and notices that the time stamps between the firewall and the host under investigation are off by 43 minutes. Which of the following is the most likely scenario occurring with the time stamps?

A. The NTP server is not configured on the host.

B. The cybersecurity analyst is looking at the wrong information.

C. The firewall is using UTC time.

D. The host with the logs is offline.

Question 2

An analyst receives an alert from the EDR indicating a user has downloaded a malicious file that is attempting to compromise the laptop. The analyst gathers the following information after isolating the machine to determine which file was in fact malicious:

Attribute Value
zipcontainer.dll 6C635BF98BD79102F6096458572...
xwizard.dtd 20052F52C677845A63B2436952E...
svch0st.exe  0AD27DC6B692903C4E129B1AD7... 

Which of the following techniques is the analyst using to identify the files?

A. Hashing

B. File extensions

C. Pattern recognition

D. Interpreting commands

Question 3

An organization's security operations team has been experiencing issues with fake news events about potential cyberattacks that could impact the organization's systems. Which of the following is the most trusted source for gathering threat intelligence?

A. Popular hacker blogs

B. Industry-related government bulletins

C. Cybersecurity social media groups

D. Dark web cyber resource groups

Question 4

A SOC analyst determined that a significant number of the reported alarms could be closed after removing the duplicates. Which of the following could help the analyst reduce the number of alarms with the least effort?

A. SOAR

B. API

C. XDR

D. REST

Question 5

A manufacturing company's assembly line machinery only functions on an end-of-life OS. Consequently, no patches exist for several highly exploitable OS vulnerabilities. Which of the following is the best mitigating control to reduce the risk of these current conditions?

A. Enforce strict network segmentation to isolate vulnerable systems from the production network.

B. Increase the system resources for vulnerable devices to prevent denial of service.

C. Perform penetration testing to verify the exploitability of these vulnerabilities.

D. Develop in-house patches to address these vulnerabilities.

Question 6

Which of the following would a security analyst most likely use to compare TTPs between different known adversaries of an organization?

A. MITRE ATT&CK

B. Cyber Kill Chain

C. OWASP

D. STIX/TAXII

Question 7

During a cybersecurity incident, one of the web servers at the perimeter network was affected by ransomware. Which of the following actions should be performed immediately?

A. Shut down the server.

B. Reimage the server.

C. Quarantine the server.

D. Update the OS to latest version.

Question 8

During which of the following incident response phases would root cause analysis occur?

A. Post-incident activity

B. Containment, eradication, and recovery

C. Preparation

D. Detection and analysis

Question 9

Which of the following is the best action to take after the conclusion of a security incident to improve incident response in the future?

A. Develop a call tree to inform impacted users.

B. Schedule a review with all teams to discuss what occurred.

C. Create an executive summary to update company leadership.

D. Review regulatory compliance with public relations for official notification.

Question 10

An analyst is remediating items associated with a recent incident. The analyst has isolated the vulnerability and is actively removing it from the system. Which of the following steps of the process does this describe?

A. Eradication

B. Recovery

C. Containment

D. Preparation

Answer key

Question 1: A (The NTP server is not configured on the host)

Question 2: A (Hashing)
Question 3: B (Industry-related government bulletins)
Question 4: A (SOAR)
Question 5: A (Enforce strict network segmentation to isolate vulnerable systems from the production network)
Question 6: A (MITRE ATT&CK)
Question 7: C (Quarantine the server)
Question 8: A (Post-incident activity)
Question 9: B (Schedule a review with all teams to discuss what occurred)

Question 10: A (Eradication)