
Cysa+2/4
Authored by Lucas Antunes
Other
11th Grade - Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What security control provides Windows administrators with an efficient way to manage system configuration settings across a large number of devices?
Anti-malware
GPO
Patch management
HIPS
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which authentication protocol was designed by Cisco to provide authentication, authorization, and accounting services?
RADIUS
Kerberos
TACACS+
CHAP
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a cyber security analyst and have been asked to review the following packet of information:
23:12:23.154234 IP 172.18.10.3:25 > 192.168.10.45:3389 Flags [P.],
Seq 1834:1245, ack1, win 511, options [nop,nop],
TS val 263451334erc 482862734, length 125
After looking over the information on the packet, you discovered there is an unauthorized service running on the host.
What ACL should be implemented to prevent further access to the unauthorized service while maintaining full access to the approved services running on that host?
DENY TCP ANY HOST 172.18.10.3 EQ 25
DENY IP HOST 192.168.10.45 ANY EQ 25
DENY TCP ANY HOST 192.168.10.45 EQ 3389
DENY IP HOST 172.18.10.3 HOST 192.168.10.45 EQ 3389
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Based on some old SIEM alerts, you have been asked to perform some forensic analysis on a particular host. You have noticed that some SSL network connections are occurring over ports other than port 443. Additionally, the SIEM alerts state that copies of svchost.exe and cmd.exe have been found in the %TEMP% folder on the host, as well as showing that RDP connections have previously connected with an IP address that is external to the corporate intranet. What threat might you have uncovered during your analysis?
DDoS
APT
Software vulnerability
Ransomware
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the proper threat classification for a security breach that employs brute-force methods to compromise, degrade, or destroy systems?
Loss or theft of equipment
Attrition
Improper usage
Impersonation
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Jacob discovers a service running on one of the ports known as a registered port while running a port scanner. What does this tell him about the service?
It isrunning on a well-known port (0-1023)
The vulnerability status of the service
It is running on a port between 1024 and 49151
The service's name
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is NOT considered part of the Internet of Things?
ICS
SCADA systems
A Windows 2016 server configured as a domain controller
Internet-connected television
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
HE_1101: Quiz #2
Quiz
•
11th Grade
20 questions
Unit 1: Research Methods Psychology
Quiz
•
11th - 12th Grade
20 questions
Quiz ODC-Jan 2021
Quiz
•
University
18 questions
Big Cats
Quiz
•
3rd - 12th Grade
20 questions
Quiz No. 1_EA
Quiz
•
University
20 questions
B5L4 Lab-Grown Meat Quiz
Quiz
•
12th Grade
15 questions
4.2.1-3 Conflicts Revision
Quiz
•
12th Grade
15 questions
Phobias
Quiz
•
12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Other
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
15 questions
Main Idea and Supporting Details.
Quiz
•
4th - 11th Grade
12 questions
Add and Subtract Polynomials
Quiz
•
9th - 12th Grade
13 questions
Model Exponential Growth and Decay Scenarios
Quiz
•
9th - 12th Grade
27 questions
7.2.3 Quadrilateral Properties
Quiz
•
9th - 12th Grade
10 questions
How to Email your Teacher
Quiz
•
Professional Development
7 questions
Amoeba Sisters Dihybrid Cross Punnett Square
Interactive video
•
9th - 12th Grade
10 questions
The Holocaust: Historical Overview
Interactive video
•
9th - 12th Grade