100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CompTIA CySA+ Practice Exam Questions And Correct Answers (Verified Answers) Plus Rationales 2025/2026 Q&A | Instant Download Pdf

Rating
-
Sold
-
Pages
24
Grade
A+
Uploaded on
24-11-2025
Written in
2025/2026

1. Which of the following best describes the purpose of a SIEM system? A. To perform penetration testing B. To collect and analyze security event logs C. To encrypt stored data D. To manage user accounts SIEM (Security Information and Event Management) aggregates logs and events from multiple sources for correlation and threat detection. 2. What is the main goal of threat hunting? A. Automate malware detection B. Proactively search for threats that evade existing defenses C. Replace antivirus software D. Improve network performance Threat hunting identifies threats not caught by automated tools.

Show more Read less
Institution
CYSA - Certified Youth Sports Administrator
Course
CYSA - Certified Youth Sports Administrator










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CYSA - Certified Youth Sports Administrator
Course
CYSA - Certified Youth Sports Administrator

Document information

Uploaded on
November 24, 2025
Number of pages
24
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CompTIA CySA+ Practice Exam Questions
And Correct Answers (Verified Answers)
Plus Rationales 2025/2026 Q&A | Instant
Download Pdf

1. Which of the following best describes the purpose of a SIEM system?
A. To perform penetration testing
B. To collect and analyze security event logs
C. To encrypt stored data
D. To manage user accounts
SIEM (Security Information and Event Management) aggregates logs and
events from multiple sources for correlation and threat detection.


2. What is the main goal of threat hunting?
A. Automate malware detection
B. Proactively search for threats that evade existing defenses
C. Replace antivirus software
D. Improve network performance
Threat hunting identifies threats not caught by automated tools.


3. A cybersecurity analyst notices unusual outbound traffic to an unknown IP
address. What should be done first?
A. Block the IP address
B. Validate and analyze the traffic
C. Disconnect the system from the network
D. Notify law enforcement
Analysts should first confirm the legitimacy of the traffic before taking action.

,4. What does CVSS stand for in vulnerability management?
A. Centralized Vulnerability Scoring System
B. Common Vulnerability Scoring System
C. Cybersecurity Vulnerability Scanning System
D. Computer Virus Scoring System
CVSS standardizes the severity rating of vulnerabilities.


5. Which attack uses a large number of compromised devices to flood a
network?
A. Phishing
B. Distributed Denial of Service (DDoS)
C. SQL Injection
D. Cross-site Scripting
DDoS attacks use multiple compromised systems to overwhelm a target.


6. What is the primary benefit of network segmentation?
A. Reduces encryption needs
B. Increases latency
C. Limits lateral movement of attackers
D. Simplifies authentication
Segmentation confines attacks to smaller network zones.


7. Which of the following best defines a false positive in IDS alerts?
A. A real attack missed by the system
B. Benign activity flagged as malicious
C. A real attack correctly identified
D. A missed alert
False positives occur when legitimate activity is incorrectly flagged.


8. What is the main function of a vulnerability scanner?

, A. Apply patches automatically
B. Identify potential weaknesses in systems
C. Perform brute-force attacks
D. Encrypt network data
Vulnerability scanners find potential flaws before exploitation.


9. Which type of malware encrypts files and demands payment?
A. Worm
B. Trojan
C. Ransomware
D. Rootkit
Ransomware locks or encrypts files until a ransom is paid.


10. What does the term “data exfiltration” mean?
A. Inbound data flooding
B. Unauthorized transfer of data outside the network
C. Data encryption at rest
D. Data loss from backup failure
Data exfiltration involves the theft of sensitive information.


11. Which of these best describes “threat intelligence”?
A. A firewall configuration
B. Information about potential and active threats
C. A password policy
D. A SIEM report
Threat intelligence provides context about adversaries and their tactics.


12. Which framework focuses on identifying, protecting, detecting,
responding, and recovering?
A. ISO 27001
B. COBIT
C. NIST Cybersecurity Framework
$22.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
lewizranking

Get to know the seller

Seller avatar
lewizranking Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
New on Stuvia
Member since
1 month
Number of followers
0
Documents
373
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions