
Cysa+2/4

Quiz
•
Other
•
11th Grade - Professional Development
•
Hard
Lucas Antunes
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What security control provides Windows administrators with an efficient way to manage system configuration settings across a large number of devices?
Anti-malware
GPO
Patch management
HIPS
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which authentication protocol was designed by Cisco to provide authentication, authorization, and accounting services?
RADIUS
Kerberos
TACACS+
CHAP
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a cyber security analyst and have been asked to review the following packet of information:
23:12:23.154234 IP 172.18.10.3:25 > 192.168.10.45:3389 Flags [P.],
Seq 1834:1245, ack1, win 511, options [nop,nop],
TS val 263451334erc 482862734, length 125
After looking over the information on the packet, you discovered there is an unauthorized service running on the host.
What ACL should be implemented to prevent further access to the unauthorized service while maintaining full access to the approved services running on that host?
DENY TCP ANY HOST 172.18.10.3 EQ 25
DENY IP HOST 192.168.10.45 ANY EQ 25
DENY TCP ANY HOST 192.168.10.45 EQ 3389
DENY IP HOST 172.18.10.3 HOST 192.168.10.45 EQ 3389
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Based on some old SIEM alerts, you have been asked to perform some forensic analysis on a particular host. You have noticed that some SSL network connections are occurring over ports other than port 443. Additionally, the SIEM alerts state that copies of svchost.exe and cmd.exe have been found in the %TEMP% folder on the host, as well as showing that RDP connections have previously connected with an IP address that is external to the corporate intranet. What threat might you have uncovered during your analysis?
DDoS
APT
Software vulnerability
Ransomware
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the proper threat classification for a security breach that employs brute-force methods to compromise, degrade, or destroy systems?
Loss or theft of equipment
Attrition
Improper usage
Impersonation
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Jacob discovers a service running on one of the ports known as a registered port while running a port scanner. What does this tell him about the service?
It isrunning on a well-known port (0-1023)
The vulnerability status of the service
It is running on a port between 1024 and 49151
The service's name
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is NOT considered part of the Internet of Things?
ICS
SCADA systems
A Windows 2016 server configured as a domain controller
Internet-connected television
Create a free account and access millions of resources
Similar Resources on Wayground
19 questions
QUIZ 1

Quiz
•
12th Grade
15 questions
CCNA 200-301 ACL + NAT

Quiz
•
1st - 12th Grade
25 questions
Cybersecurity PBQ Quiz

Quiz
•
University
15 questions
1. Intro to CC and AWS

Quiz
•
University
20 questions
Computer Network & Local Area Network (LAN)

Quiz
•
10th - 12th Grade
20 questions
Ethical Hacking

Quiz
•
University
20 questions
Comptia network plus

Quiz
•
12th Grade - Professi...
15 questions
ICT Exam Questions

Quiz
•
University
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade