This is a scored practice assessment. It is not timed. Use it to identify weak domains before a timed attempt.
Cybersecurity practice assessment. Practice and Strategy
12 questions

Eradication too early can make an incident worse because:

response

Scenario: You have 300 vulnerabilities. What is the most defensible first prioritisation signal?

vuln-mgmt

Scenario: A control exists but nobody can show evidence it works. What does that mean in practice?

governance

Scenario: You suspect compromise. What is the most defensible first move?

response

A supplier asks for broad access to your production data. What is the best response?

supply-chain

Scenario: A critical system has a known exploited vulnerability. What is the defensible priority?

vuln-mgmt

What makes a security metric credible to a sceptical reviewer?

governance

Scenario: You find suspicious activity but no clear impact yet. What is the most defensible next step?

response

Scenario: You patched a vulnerability. What makes the fix defensible?

vuln-mgmt

Scenario: A dependency is compromised upstream. What preparation limits damage most?

supply-chain

Scenario: Teams bypass controls to ship faster. What is the governance failure?

governance

Scenario: You must brief executives. What is the most defensible format?

response
Add CPD reflection (optional)
One short paragraph makes your CPD evidence much stronger.
Pick one incorrect answer and write a one-paragraph note: what assumption changed, what evidence you would gather, and what control you would apply first.

Quick feedback

Optional. This helps improve accuracy and usefulness. No accounts required.