Search Header Logo

CySa+ PT5: 3 of 3

Authored by MRCOACHRAY RAY

Computers, Professional Development, Instructional Technology

9th Grade - Professional Development

Used 1+ times

CySa+ PT5: 3 of 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool is NOT useful for capturing or analyzing memory data for forensic analysis on a Windows machine?

Fmem

Volatility Framework

​DumpIt

​EnCase

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Richard’s company processes credit cards and they are required to be compliant with PCI-DSS. If his company has a breach of card data, what type of disclosure will they have to provide?

Notification to local law enforcement

​Notification to their acquiring bank

Notification to federal law enforcement

​Notification to Visa and Mastercard

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rhonda would like to build some scripts that detect malware beaconing behavior. Which one of the following isn’t a typical means of identifying malware behavior on a network?

​Persistence of the beaconing

​Beacon protocol

​Beaconing interval

​Removal of known traffic

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What security control provides Windows administrators with an efficient way to manage system configuration settings across a large number of devices?

​Patch management

​GPO

​HIPS

Anti-malware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tyler needs to implement a security control designed to detect fraudulent cases that happen, regardless of the presence of other security controls. Which of the following is best suited to meet his needs?

​Separation of duties

​Least privilege

​Dual control

​Mandatory vacations

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The service desk has been receiving a large number of complaints from external users that a web application is responding slow to requests and frequently receives a “connection timed out” error when they attempt to submit information into the application. What software development best practice should have been implemented in order to have prevented this issue from occurring?

stress testing

regression testing

​input validation

fuzzing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What SDLC model emphasizes individuals and interactions over processes and tools, customer collaboration over contract negotiation, and working software over comprehensive documentation?

​Waterfall

​Spiral

Agile

​RAD

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?