
CySa+ PT5: 3 of 3
Authored by MRCOACHRAY RAY
Computers, Professional Development, Instructional Technology
9th Grade - Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What tool is NOT useful for capturing or analyzing memory data for forensic analysis on a Windows machine?
Fmem
Volatility Framework
DumpIt
EnCase
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Richard’s company processes credit cards and they are required to be compliant with PCI-DSS. If his company has a breach of card data, what type of disclosure will they have to provide?
Notification to local law enforcement
Notification to their acquiring bank
Notification to federal law enforcement
Notification to Visa and Mastercard
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Rhonda would like to build some scripts that detect malware beaconing behavior. Which one of the following isn’t a typical means of identifying malware behavior on a network?
Persistence of the beaconing
Beacon protocol
Beaconing interval
Removal of known traffic
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What security control provides Windows administrators with an efficient way to manage system configuration settings across a large number of devices?
Patch management
GPO
HIPS
Anti-malware
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Tyler needs to implement a security control designed to detect fraudulent cases that happen, regardless of the presence of other security controls. Which of the following is best suited to meet his needs?
Separation of duties
Least privilege
Dual control
Mandatory vacations
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The service desk has been receiving a large number of complaints from external users that a web application is responding slow to requests and frequently receives a “connection timed out” error when they attempt to submit information into the application. What software development best practice should have been implemented in order to have prevented this issue from occurring?
stress testing
regression testing
input validation
fuzzing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What SDLC model emphasizes individuals and interactions over processes and tools, customer collaboration over contract negotiation, and working software over comprehensive documentation?
Waterfall
Spiral
Agile
RAD
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?