FlashGenius Logo FlashGenius
Login Sign Up

CySA+ Practice Questions: Incident Response Management Domain

Test your CySA+ knowledge with 5 practice questions from the Incident Response Management domain. Includes detailed explanations and answers.

CySA+ Practice Questions

Master the Incident Response Management Domain

Test your knowledge in the Incident Response Management domain with these 5 practice questions. Each question is designed to help you prepare for the CySA+ certification exam with detailed explanations to reinforce your learning.

Question 1

A vulnerability scan reveals that a web server is susceptible to SQL injection attacks. What is the most appropriate immediate action for the security analyst to take?

A) Update the web application to the latest version.

B) Implement a web application firewall (WAF) to block SQL injection attempts.

C) Notify the development team to review the code for vulnerabilities.

D) Immediately take the web server offline to prevent exploitation.

Show Answer & Explanation

Correct Answer: B

Explanation: Implementing a web application firewall (WAF) can provide immediate protection against SQL injection attacks while a more permanent solution, such as code review and updates, is being developed. Taking the server offline might not be feasible and could disrupt services.

Question 2

A security analyst is reviewing SIEM logs and notices a pattern of failed login attempts followed by successful logins from various IP addresses. What is the most likely explanation for this pattern?

A) The user is traveling and logging in from different locations.

B) The account credentials have been compromised and are being used by an attacker.

C) The user is experiencing network issues causing intermittent connectivity.

D) The user has shared their login credentials with multiple people.

Show Answer & Explanation

Correct Answer: B

Explanation: The pattern of failed login attempts followed by successful logins from different IP addresses suggests that the account credentials have been compromised and are being used by an attacker. Options A and C are possible but less likely given the suspicious pattern. Option D is a policy violation but doesn't explain the pattern.

Question 3

After identifying a malware infection on a corporate network, a security analyst is tasked with determining the initial attack vector. Which of the following sources would provide the most useful information?

A) Firewall logs

B) Email server logs

C) Endpoint antivirus logs

D) Web proxy logs

Show Answer & Explanation

Correct Answer: B

Explanation: Email server logs are useful for identifying phishing emails or malicious attachments, which are common initial attack vectors for malware infections. Firewall logs (Option A) and web proxy logs (Option D) can provide information on external connections but not necessarily the initial vector. Endpoint antivirus logs (Option C) show detection but not how the malware entered.

Question 4

A security analyst receives an alert from the SIEM indicating multiple failed login attempts from a single IP address targeting several user accounts. What should be the analyst's first step in responding to this potential incident?

A) Block the IP address at the firewall.

B) Verify the alert with corresponding log data.

C) Notify the affected users to change their passwords.

D) Initiate a full network scan for vulnerabilities.

Show Answer & Explanation

Correct Answer: B

Explanation: The first step in incident response is to verify the alert by checking the corresponding log data to ensure it is not a false positive. Blocking the IP address or notifying users should only occur after confirmation. Initiating a network scan is not directly related to addressing the alert.

Question 5

During a security incident, an analyst identifies that a file server has been compromised and sensitive data has been exfiltrated. Which of the following is the most critical action to take first?

A) Notify affected users about the data breach.

B) Isolate the server from the network.

C) Conduct a full forensic analysis of the server.

D) Update the incident response plan.

Show Answer & Explanation

Correct Answer: B

Explanation: The most critical action is to isolate the server to prevent further data exfiltration and contain the breach. Notifying users and conducting forensic analysis should follow once the threat is contained.

Ready to Accelerate Your CySA+ Preparation?

Join thousands of professionals who are advancing their careers through expert certification preparation with FlashGenius.

  • ✅ Unlimited practice questions across all CySA+ domains
  • ✅ Full-length exam simulations with real-time scoring
  • ✅ AI-powered performance tracking and weak area identification
  • ✅ Personalized study plans with adaptive learning
  • ✅ Mobile-friendly platform for studying anywhere, anytime
  • ✅ Expert explanations and study resources
Start Free Practice Now

Already have an account? Sign in here

About CySA+ Certification

The CySA+ certification validates your expertise in incident response management and other critical domains. Our comprehensive practice questions are carefully crafted to mirror the actual exam experience and help you identify knowledge gaps before test day.