Cysa+2/4

Cysa+2/4

11th Grade - Professional Development

20 Qs

quiz-placeholder

Similar activities

Basic Concept of Disaster  and Disaster Risk

Basic Concept of Disaster and Disaster Risk

11th Grade

21 Qs

CCENT Practice #1

CCENT Practice #1

11th - 12th Grade

20 Qs

Logging and Kernel Management Quiz

Logging and Kernel Management Quiz

University

20 Qs

Uji Kognitif DHCP Server

Uji Kognitif DHCP Server

11th Grade

20 Qs

GEN 008 P1 Quiz

GEN 008 P1 Quiz

University

18 Qs

QUIZZ AIJ - KONSEP ROUTING

QUIZZ AIJ - KONSEP ROUTING

KG - Professional Development

20 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

20 Qs

Keamanan Digital 1

Keamanan Digital 1

University

15 Qs

Cysa+2/4

Cysa+2/4

Assessment

Quiz

Other

11th Grade - Professional Development

Hard

Created by

Lucas Antunes

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What security control provides Windows administrators with an efficient way to manage system configuration settings across a large number of devices?

Anti-malware

GPO

Patch management

HIPS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication protocol was designed by Cisco to provide authentication, authorization, and accounting services?

RADIUS

Kerberos

TACACS+

CHAP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a cyber security analyst and have been asked to review the following packet of information:


23:12:23.154234 IP 172.18.10.3:25 > 192.168.10.45:3389 Flags [P.],

Seq 1834:1245, ack1, win 511, options [nop,nop],

TS val 263451334erc 482862734, length 125

After looking over the information on the packet, you discovered there is an unauthorized service running on the host.

What ACL should be implemented to prevent further access to the unauthorized service while maintaining full access to the approved services running on that host?

DENY TCP ANY HOST 172.18.10.3 EQ 25

DENY IP HOST 192.168.10.45 ANY EQ 25

DENY TCP ANY HOST 192.168.10.45 EQ 3389

DENY IP HOST 172.18.10.3 HOST 192.168.10.45 EQ 3389

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Based on some old SIEM alerts, you have been asked to perform some forensic analysis on a particular host. You have noticed that some SSL network connections are occurring over ports other than port 443. Additionally, the SIEM alerts state that copies of svchost.exe and cmd.exe have been found in the %TEMP% folder on the host, as well as showing that RDP connections have previously connected with an IP address that is external to the corporate intranet. What threat might you have uncovered during your analysis?

DDoS

APT

Software vulnerability

Ransomware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the proper threat classification for a security breach that employs brute-force methods to compromise, degrade, or destroy systems?

Loss or theft of equipment

Attrition

Improper usage

Impersonation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jacob discovers a service running on one of the ports known as a registered port while running a port scanner. What does this tell him about the service?

It isrunning on a well-known port (0-1023)

The vulnerability status of the service

It is running on a port between 1024 and 49151

The service's name

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT considered part of the Internet of Things?

ICS

SCADA systems

A Windows 2016 server configured as a domain controller

Internet-connected television

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Other