Search Header Logo

Cysa+2/4

Authored by Lucas Antunes

Other

11th Grade - Professional Development

Cysa+2/4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What security control provides Windows administrators with an efficient way to manage system configuration settings across a large number of devices?

Anti-malware

GPO

Patch management

HIPS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication protocol was designed by Cisco to provide authentication, authorization, and accounting services?

RADIUS

Kerberos

TACACS+

CHAP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a cyber security analyst and have been asked to review the following packet of information:


23:12:23.154234 IP 172.18.10.3:25 > 192.168.10.45:3389 Flags [P.],

Seq 1834:1245, ack1, win 511, options [nop,nop],

TS val 263451334erc 482862734, length 125

After looking over the information on the packet, you discovered there is an unauthorized service running on the host.

What ACL should be implemented to prevent further access to the unauthorized service while maintaining full access to the approved services running on that host?

DENY TCP ANY HOST 172.18.10.3 EQ 25

DENY IP HOST 192.168.10.45 ANY EQ 25

DENY TCP ANY HOST 192.168.10.45 EQ 3389

DENY IP HOST 172.18.10.3 HOST 192.168.10.45 EQ 3389

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Based on some old SIEM alerts, you have been asked to perform some forensic analysis on a particular host. You have noticed that some SSL network connections are occurring over ports other than port 443. Additionally, the SIEM alerts state that copies of svchost.exe and cmd.exe have been found in the %TEMP% folder on the host, as well as showing that RDP connections have previously connected with an IP address that is external to the corporate intranet. What threat might you have uncovered during your analysis?

DDoS

APT

Software vulnerability

Ransomware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the proper threat classification for a security breach that employs brute-force methods to compromise, degrade, or destroy systems?

Loss or theft of equipment

Attrition

Improper usage

Impersonation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jacob discovers a service running on one of the ports known as a registered port while running a port scanner. What does this tell him about the service?

It isrunning on a well-known port (0-1023)

The vulnerability status of the service

It is running on a port between 1024 and 49151

The service's name

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT considered part of the Internet of Things?

ICS

SCADA systems

A Windows 2016 server configured as a domain controller

Internet-connected television

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?