CYSA + (351-400)

CYSA + (351-400)

KG

49 Qs

quiz-placeholder

Similar activities

EHE Module 01: Information Security Fundamentals

EHE Module 01: Information Security Fundamentals

12th Grade

53 Qs

#2 CIW Data Analyst - Certification Prep

#2 CIW Data Analyst - Certification Prep

9th Grade - University

54 Qs

Comptia IT F CH7

Comptia IT F CH7

9th - 12th Grade

44 Qs

CySA+ (1-50)

CySA+ (1-50)

KG

49 Qs

CySA+ (51-100)

CySA+ (51-100)

KG

50 Qs

CYSA + (251-300)

CYSA + (251-300)

KG

48 Qs

GRADE 11 QUIZ ON COMPUTER JOBS

GRADE 11 QUIZ ON COMPUTER JOBS

5th Grade

50 Qs

CSEC IT - 14 SDLC

CSEC IT - 14 SDLC

11th - 12th Grade

49 Qs

CYSA + (351-400)

CYSA + (351-400)

Assessment

Quiz

Computers

KG

Medium

Created by

cysa cysa

Used 23+ times

FREE Resource

49 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.351 A security analyst notices the following entry while reviewing the server togs OR 1=1' ADDUSER attacker' PW 1337password' ---- Which of the following events occurred?

A. CSRF

B. XSS

C. SQLi

D. RCE

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.352 Which of the following is MOST dangerous to the client environment during a vulnerabilityassessment penetration test?

A. There is a longer period of time to assess the environment.

B. The testing is outside the contractual scope

C. There is a shorter period of time to assess the environment

D. No status reports are included with the assessment.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.353 A security analyst for a large pharmaceutical company was given credentials from a threatintelligence resources organisation for Internal users, which contain usernames and valid passwordsfor company accounts. Which of the following is the FIRST action the analyst should take as part ofsecurity operations monitoring?

A. Run scheduled antivirus scans on all employees' machines to look for malicious processes

B. Reimage the machines of all users within the group in case of a malware infection.

C. Change all the user passwords to ensure the malicious actors cannot use them

D. Search the event logs for event identifiers that indicate Mimikatz was used

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.354 When attempting to do a stealth scan against a system that does not respond to ping, whichof the following Nmap commands BEST accomplishes that goal?

A. nmap -sA -O <system> -noping

B. nmap -sT -O <system> -P0

C. nmap -sS -O <system> -P0

D. nmap -sQ -O <system> -P0

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.355 Due to a rise m cyberattackers seeking PHI, a healthcare company that collects highlysensitive data from millions of customers is deploying a solution that will ensure the customers' datais protected by the organization internally and externally Which of the following countermeasurescan BEST prevent the loss of customers' sensitive data?

A. Implement privileged access management.

B. Implement a risk management process.

C. Implement multifactor authentication.

D. Add more security resources to the environment

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

NO.356 A security analyst inspects the header of an email that is presumed to be malicious and seesthe following: Which of the following is inconsistent with the rest of the header and should be treated assuspicious?

A. The subject line

B. The sender's email address

C. The destination email server

D. The use of a TLS cipher

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.357 Which of the following is a best practice when sending a file/data to another individual in anorganization?

A. Encrypt the file but do not compress it

B. When encrypting, split the file: and then compress each file

C. Compress and then encrypt the file.

D. Encrypt and then compress the file.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers