CySA+ (151-200)

CySA+ (151-200)

KG

49 Qs

quiz-placeholder

Similar activities

SY0-501 Practice Quiz 8

SY0-501 Practice Quiz 8

Professional Development

50 Qs

JOB PROFILE TJKT

JOB PROFILE TJKT

10th Grade

50 Qs

CMO: Chapter 3

CMO: Chapter 3

KG

44 Qs

CySA + (301-350)

CySA + (301-350)

KG

49 Qs

CSEC IT - 14 SDLC

CSEC IT - 14 SDLC

11th - 12th Grade

49 Qs

KS3 Computing

KS3 Computing

6th - 8th Grade

50 Qs

EHE Module 01: Information Security Fundamentals

EHE Module 01: Information Security Fundamentals

12th Grade

53 Qs

#2 CIW Data Analyst - Certification Prep

#2 CIW Data Analyst - Certification Prep

9th Grade - University

54 Qs

CySA+ (151-200)

CySA+ (151-200)

Assessment

Quiz

Computers

KG

Easy

Created by

cysa cysa

Used 40+ times

FREE Resource

49 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.151 Which of the following technologies can be used to house the entropy keys for disk

encryption on desktops and laptops?

Self-encrypting drive

Bus encryption

TPM

HSM

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.153 An employee in the billing department accidentally sent a spreadsheet containing payment

card data to a recipient outside the organization The employee intended to send the spreadsheet to

an internal staff member with a similar name and was unaware of the mistake until the recipient

replied to the message In addition to retraining the employee, which of the following would prevent

this from happening in the future?

(ExamTopic'e gore guncellendi)

A. Implement outgoing filter rules to quarantine messages that contain card data

B. Configure the outgoing mail filter to allow attachments only to addresses on the whitelist

C. Remove all external recipients from the employee's address book

D. Set the outgoing mail filter to strip spreadsheet attachments from all messages.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.152 A cybersecurity analyst is responding to an incident. The company's leadership team wants

to attribute the incident to an attack group. Which of the following models would BEST apply to the

situation?

Intelligence cycle

Diamond Model of Intrusion Analysis

Kill chain

MITRE ATT&CK

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.154 During an investigation, a security analyst determines suspicious activity occurred during

the night shift over the weekend. Further investigation reveals the activity was initiated from an

internal IP going to an external website.

Which of the following would be the MOST appropriate recommendation to prevent the activity from

happening in the future?

An IPS signature modification for the specific IP addresses

An IDS signature modification for the specific IP addresses

A firewall rule that will block port 80 traffic

A firewall rule that will block traffic from the specific IP addresses

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.155 Company A is m the process of merging with Company B As part of the merger, connectivity between the ERP systems must be established so portent financial information can be shared between the two entitles. Which of the following will establish a more automated approach to secure data transfers between the two entities?

A. Set up an FTP server that both companies can access and export the required financial data to a

folder.

B. Set up a VPN between Company A and Company B. granting access only lo the ERPs within the

connection

C. Set up a PKI between Company A and Company B and Intermediate shared certificates between

the two entities

D. Create static NATs on each entity's firewalls that map lo the ERP systems and use native ERP

authentication to allow access.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
Media Image

xxx

xxx

xxx

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.157 A code review reveals a web application is using lime-based cookies for session

management. This is a security concern because lime-based cookies are easy to:

parameterize.

decode.

guess.

decrypt.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers