CySA+ (51-100)

CySA+ (51-100)

KG

50 Qs

quiz-placeholder

Similar activities

AKT test (401-450)  Ескі вариант

AKT test (401-450) Ескі вариант

University

50 Qs

Sec Study Quiz 5

Sec Study Quiz 5

Professional Development

48 Qs

EHE Module 01: Information Security Fundamentals

EHE Module 01: Information Security Fundamentals

12th Grade

53 Qs

#2 CIW Data Analyst - Certification Prep

#2 CIW Data Analyst - Certification Prep

9th Grade - University

54 Qs

CySA + (301-350)

CySA + (301-350)

KG

49 Qs

CySA+ (151-200)

CySA+ (151-200)

KG

49 Qs

#5 CIW Data Analyst - Certification Prep

#5 CIW Data Analyst - Certification Prep

9th Grade - University

54 Qs

CSEC IT - 14 SDLC

CSEC IT - 14 SDLC

11th - 12th Grade

49 Qs

CySA+ (51-100)

CySA+ (51-100)

Assessment

Quiz

Computers

KG

Easy

Created by

cysa cysa

Used 42+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

NO.51 An online gaming company was impacted by a ransomware attack. An employee opened an attachment that was received via an SMS attack on a company-issued mobile device while connected to the network. Which of the following actions would help during the forensic analysis of the mobile device? (Select TWO)

A. Resetting the phone to factory settings

B. Rebooting the phone and installing the latest security updates

C. Documenting the respective chain of custody

D. Uninstalling any potentially unwanted programs

E. Performing a memory dump of the mobile device for analysis

F. Unlocking the device by browsing the eFuse

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.52 An analyst receives an alert from the continuous-monitoring solution about unauthorized

changes to the firmware versions on several field devices. The asset owners confirm that no firmware

version updates were performed by authorized technicians, and customers have not reported any

performance issues or outages. Which Of the following actions would be BEST for the analyst to

recommend to the asset owners to secure the devices from further exploitation?

A. Change the passwords on the devices.

B. Implement BIOS passwords.

C. Remove the assets from the production network for analysis

D. Report the findings to the threat intel community.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.53 A security analyst reviews a recent network capture and notices encrypted inbound traffic on TCP port 465 was coming into the company's network from a database server. Which of the following will the security analyst MOST likely identify as the reason for the traffic on this port?

A. The server is receiving a secure connection using the new TLS 1.3 standard

B. Someone has configured an unauthorized SMTP application over SSL

C. The traffic is common static data that Windows servers send to Microsoft

D. A connection from the database to the web front end is communicating on the port

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.54 Due to the continued support of legacy applications, an organization's enterprise password complexity rules are inadequate for its required security posture. Which of the following is the BEST compensating control to help reduce authentication compromises?

A. Smart cards

B. Multifactor authentication

C. Biometrics

D. Increased password-rotation frequency

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.55 A security analyst identified some potentially malicious processes after capturing the contents of memory from a machine during incident response. Which of the following procedures is the NEXT step for further in investigation?

A. Data carving

B. Timeline construction

C. File cloning

D. Reverse engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.56 A company's Chief Information Officer wants to use a CASB solution to ensure policies are

being met during cloud access. Due to the nature of the company's business and risk appetite, the

management team elected to not store financial information in the cloud. A security analyst needs to

recommend a solution to mitigate the threat of financial data leakage into the cloud. Which of the

following should the analyst recommend?

A. Utilize the CASB to enforce DLP data-at-rest protection for financial information that is stored on

premises.

B. Do not utilize the CASB solution for this purpose, but add DLP on premises for data in motion.

C. Utilize the CASB to enforce DLP data-in-motion protection for financial information moving to the

cloud.

D. Do not utilize the CASB solution for this purpose, but add DLP on premises for data at res

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.57 A general contractor has a list of contract documents containing critical business data that are stored at a public cloud provider. The organization's security analyst recently reviewed some of the storage containers and discovered most of the containers are not encrypted. Which of the following configurations will provide the MOST security to resolve the vulnerability?

A. Upgrading TLS 1.2 connections to TLS 1.3

B. Implementing AES-256 encryption on the containers

C. Enabling SHA-256 hashing on the containers

D. Implementing the Triple Data Encryption Algorithm at the file level

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?