CySa+ PT5: 3 of 3

CySa+ PT5: 3 of 3

9th Grade - Professional Development

20 Qs

quiz-placeholder

Similar activities

Network & security Final Quiz

Network & security Final Quiz

Professional Development

16 Qs

ITE8 - Module 11 Part 3 Quiz

ITE8 - Module 11 Part 3 Quiz

10th Grade

15 Qs

The CIA Triad

The CIA Triad

9th Grade

20 Qs

Security+

Security+

University

15 Qs

AIJ Konsep Firewall - XII TKJ

AIJ Konsep Firewall - XII TKJ

12th Grade

15 Qs

Multi Factor Authentication

Multi Factor Authentication

University

20 Qs

Module 8 - VPN and IPsec Concepts Review

Module 8 - VPN and IPsec Concepts Review

12th Grade

20 Qs

COMPUTING CHAPTER 3-4 part1

COMPUTING CHAPTER 3-4 part1

University

15 Qs

CySa+ PT5: 3 of 3

CySa+ PT5: 3 of 3

Assessment

Quiz

Computers, Professional Development, Instructional Technology

9th Grade - Professional Development

Medium

Created by

MRCOACHRAY RAY

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool is NOT useful for capturing or analyzing memory data for forensic analysis on a Windows machine?

Fmem

Volatility Framework

​DumpIt

​EnCase

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Richard’s company processes credit cards and they are required to be compliant with PCI-DSS. If his company has a breach of card data, what type of disclosure will they have to provide?

Notification to local law enforcement

​Notification to their acquiring bank

Notification to federal law enforcement

​Notification to Visa and Mastercard

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rhonda would like to build some scripts that detect malware beaconing behavior. Which one of the following isn’t a typical means of identifying malware behavior on a network?

​Persistence of the beaconing

​Beacon protocol

​Beaconing interval

​Removal of known traffic

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What security control provides Windows administrators with an efficient way to manage system configuration settings across a large number of devices?

​Patch management

​GPO

​HIPS

Anti-malware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tyler needs to implement a security control designed to detect fraudulent cases that happen, regardless of the presence of other security controls. Which of the following is best suited to meet his needs?

​Separation of duties

​Least privilege

​Dual control

​Mandatory vacations

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The service desk has been receiving a large number of complaints from external users that a web application is responding slow to requests and frequently receives a “connection timed out” error when they attempt to submit information into the application. What software development best practice should have been implemented in order to have prevented this issue from occurring?

stress testing

regression testing

​input validation

fuzzing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What SDLC model emphasizes individuals and interactions over processes and tools, customer collaboration over contract negotiation, and working software over comprehensive documentation?

​Waterfall

​Spiral

Agile

​RAD

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?