CySA+ (151-200)

CySA+ (151-200)

KG

49 Qs

quiz-placeholder

Similar activities

ÔN THI HKII

ÔN THI HKII

3rd - 6th Grade

50 Qs

HTML

HTML

8th Grade

54 Qs

Google Sheets Revision 1

Google Sheets Revision 1

6th - 10th Grade

50 Qs

ULANGAN HARIAN 3 -  SISTEM KOMPUTER

ULANGAN HARIAN 3 - SISTEM KOMPUTER

10th Grade - University

50 Qs

MF0973 Grabación de datos

MF0973 Grabación de datos

12th Grade

44 Qs

Ôn tập ic3 spark sau mùa covid-19

Ôn tập ic3 spark sau mùa covid-19

1st - 2nd Grade

49 Qs

HCI MIDTERM EXAMINATIONS

HCI MIDTERM EXAMINATIONS

12th Grade

50 Qs

9.1.4 Python Quiz 🐍

9.1.4 Python Quiz 🐍

9th Grade

48 Qs

CySA+ (151-200)

CySA+ (151-200)

Assessment

Quiz

Computers

KG

Practice Problem

Easy

Created by

cysa cysa

Used 40+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

49 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.151 Which of the following technologies can be used to house the entropy keys for disk

encryption on desktops and laptops?

Self-encrypting drive

Bus encryption

TPM

HSM

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.153 An employee in the billing department accidentally sent a spreadsheet containing payment

card data to a recipient outside the organization The employee intended to send the spreadsheet to

an internal staff member with a similar name and was unaware of the mistake until the recipient

replied to the message In addition to retraining the employee, which of the following would prevent

this from happening in the future?

(ExamTopic'e gore guncellendi)

A. Implement outgoing filter rules to quarantine messages that contain card data

B. Configure the outgoing mail filter to allow attachments only to addresses on the whitelist

C. Remove all external recipients from the employee's address book

D. Set the outgoing mail filter to strip spreadsheet attachments from all messages.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.152 A cybersecurity analyst is responding to an incident. The company's leadership team wants

to attribute the incident to an attack group. Which of the following models would BEST apply to the

situation?

Intelligence cycle

Diamond Model of Intrusion Analysis

Kill chain

MITRE ATT&CK

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.154 During an investigation, a security analyst determines suspicious activity occurred during

the night shift over the weekend. Further investigation reveals the activity was initiated from an

internal IP going to an external website.

Which of the following would be the MOST appropriate recommendation to prevent the activity from

happening in the future?

An IPS signature modification for the specific IP addresses

An IDS signature modification for the specific IP addresses

A firewall rule that will block port 80 traffic

A firewall rule that will block traffic from the specific IP addresses

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.155 Company A is m the process of merging with Company B As part of the merger, connectivity between the ERP systems must be established so portent financial information can be shared between the two entitles. Which of the following will establish a more automated approach to secure data transfers between the two entities?

A. Set up an FTP server that both companies can access and export the required financial data to a

folder.

B. Set up a VPN between Company A and Company B. granting access only lo the ERPs within the

connection

C. Set up a PKI between Company A and Company B and Intermediate shared certificates between

the two entities

D. Create static NATs on each entity's firewalls that map lo the ERP systems and use native ERP

authentication to allow access.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Media Image

xxx

xxx

xxx

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.157 A code review reveals a web application is using lime-based cookies for session

management. This is a security concern because lime-based cookies are easy to:

parameterize.

decode.

guess.

decrypt.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?