Sybex Practice Test 01
Flashcard
•
Information Technology (IT)
•
Professional Development
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Student preview

42 questions
Show all answers
1.
FLASHCARD QUESTION
Front
What is the most likely cause of a sudden drop to zero in network flow on a particular segment? Options: A denial-of-service attack, A link failure, High bandwidth consumption, Beaconing
Back
A link failure
Answer explanation
The sudden drop to zero is most likely to be an example of link failure. A denial-of-service
attack could result in this type of drop but is less likely for most organizations. High bandwidth
consumption and beaconing both show different traffic patterns than shown in this example.
2.
FLASHCARD QUESTION
Front
Which one of the following should be Saanvi's highest priority for patching during the recovery process after a security incident? Windows systems, Systems involved in the incident, Linux systems, Web servers
Back
Systems involved in the incident
Answer explanation
During an incident recovery effort, patching priority should be placed on systems that
were directly involved in the incident. This is one component of remediating known issues
that were actively exploited.
3.
FLASHCARD QUESTION
Front
Susan’s organization suffered from a major breach attributed to an advanced persistent threat (APT) using exploits of zero-day vulnerabilities. Which of the following is the least appropriate solution for Susan to recommend to help prevent future attacks of this type? Heuristic attack detection methods, Signature-based attack detection methods, Segmentation, Leverage threat intelligence
Back
Signature-based attack detection methods
Answer explanation
Signature-based attack detection methods rely on knowing what an attack or malware looks like. Zero-day attacks are unlikely to have an existing signature, making them a poor choice to prevent them. Heuristic (behavior) detection methods can indicate compromises despite the lack of signatures for the specific exploit. Building a well-designed and segmented network can limit the impact of compromises or even prevent them. Leveraging threat intelligence
to understand new attacks and countermeasures is an important part of defense against zero-day attacks.
4.
FLASHCARD QUESTION
Front
During his investigation of a Windows system, Eric discovered that files were deleted and he wants to determine whether a specific file previously existed on the computer. Which of the following is the least likely to be a potential location to discover evidence supporting that theory? Windows registry, Master File Table, INDX files, Event logs
Back
Event logs
Answer explanation
The Windows registry, Master File Tables, and INDX files all contain information about files, often including removed or deleted files. Event logs are far less likely to contain information about a specific file location.
5.
FLASHCARD QUESTION
Front
As part of her SOC analyst duties, Emily is tasked with monitoring intrusion detection systems that cover her employer’s corporate headquarters network. During her shift, Emily’s IDS alarms report that a network scan has occurred from a system with IP address 10.0.11.19 on the organization’s WPA3 Enterprise wireless network aimed at systems in the finance division. What data source should she check first?
Back
Wireless authentication logs
Answer explanation
Since Emily’s organization uses WPA3 Enterprise, users must authenticate to use the wireless network. Associating the scan with an authenticated user will help incident responders identify the device that conducted the scan.
6.
FLASHCARD QUESTION
Front
Casey’s incident response process leads her to a production server that must stay online for her company’s business to remain operational. What method should she use to capture the data she needs?
Back
Live image to an external drive.
Answer explanation
Normally, forensic images are collected from systems that are offline to ensure that a complete copy is made. In cases like this where keeping the system online is more important than the completeness of the forensic image, a live image to an external drive using a portable
forensic tool such as FTK Imager Lite, dd, or similar is the correct choice.
7.
FLASHCARD QUESTION
Front
What does the Nmap response “filtered” mean in port scan results?
Back
Nmap cannot tell whether the port is open or closed.
Answer explanation
When Nmap returns a response of “filtered,” it indicates that Nmap cannot tell whether
the port is open or closed. Filtered results are often the result of a firewall or other network
device, but a response of filtered does not indicate that a firewall or IPS was detected.
When Nmap returns a “closed” result, it means that there is no application listening at
that moment.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
38 questions
Medical Vocabulary Flashcards
Flashcard
•
10th Grade
36 questions
Environmental Awareness Flashcard
Flashcard
•
8th Grade
38 questions
Reactions 1 (Activate Y7) - Glossary Flashcard
Flashcard
•
6th - 8th Grade
36 questions
EsP 9 Fourth Grading Reviewer
Flashcard
•
9th Grade
40 questions
Directions - English to Estonian
Flashcard
•
University
44 questions
Electromagnetism IGCSE
Flashcard
•
9th - 11th Grade
44 questions
Waves 1 - Light (Activate Y7) - Glossary Flashcard
Flashcard
•
6th - 8th Grade
36 questions
Mirror and Mental Health Vocabulary
Flashcard
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Information Technology (IT)
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
100 questions
Screening Test Customer Service
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
10 questions
Reading a ruler in Inches
Quiz
•
4th Grade - Professio...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development