CYSA + (351-400)

CYSA + (351-400)

KG

49 Qs

quiz-placeholder

Similar activities

Teori Bahasa dan Otomata

Teori Bahasa dan Otomata

University

50 Qs

Google Search

Google Search

3rd - 5th Grade

46 Qs

PTS INFORMATIKA

PTS INFORMATIKA

10th Grade

52 Qs

CSS 9- Third Quarter Periodic Examination

CSS 9- Third Quarter Periodic Examination

9th Grade

50 Qs

KS3 Graphics Assessment

KS3 Graphics Assessment

7th - 9th Grade

50 Qs

TN Tin 6 Bài 1-5

TN Tin 6 Bài 1-5

11th Grade

45 Qs

Ôn tập

Ôn tập

10th Grade

45 Qs

Y11 Assessment Prep

Y11 Assessment Prep

9th - 10th Grade

46 Qs

CYSA + (351-400)

CYSA + (351-400)

Assessment

Quiz

Computers

KG

Practice Problem

Medium

Created by

cysa cysa

Used 23+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

49 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.351 A security analyst notices the following entry while reviewing the server togs OR 1=1' ADDUSER attacker' PW 1337password' ---- Which of the following events occurred?

A. CSRF

B. XSS

C. SQLi

D. RCE

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.352 Which of the following is MOST dangerous to the client environment during a vulnerabilityassessment penetration test?

A. There is a longer period of time to assess the environment.

B. The testing is outside the contractual scope

C. There is a shorter period of time to assess the environment

D. No status reports are included with the assessment.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.353 A security analyst for a large pharmaceutical company was given credentials from a threatintelligence resources organisation for Internal users, which contain usernames and valid passwordsfor company accounts. Which of the following is the FIRST action the analyst should take as part ofsecurity operations monitoring?

A. Run scheduled antivirus scans on all employees' machines to look for malicious processes

B. Reimage the machines of all users within the group in case of a malware infection.

C. Change all the user passwords to ensure the malicious actors cannot use them

D. Search the event logs for event identifiers that indicate Mimikatz was used

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.354 When attempting to do a stealth scan against a system that does not respond to ping, whichof the following Nmap commands BEST accomplishes that goal?

A. nmap -sA -O <system> -noping

B. nmap -sT -O <system> -P0

C. nmap -sS -O <system> -P0

D. nmap -sQ -O <system> -P0

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.355 Due to a rise m cyberattackers seeking PHI, a healthcare company that collects highlysensitive data from millions of customers is deploying a solution that will ensure the customers' datais protected by the organization internally and externally Which of the following countermeasurescan BEST prevent the loss of customers' sensitive data?

A. Implement privileged access management.

B. Implement a risk management process.

C. Implement multifactor authentication.

D. Add more security resources to the environment

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

NO.356 A security analyst inspects the header of an email that is presumed to be malicious and seesthe following: Which of the following is inconsistent with the rest of the header and should be treated assuspicious?

A. The subject line

B. The sender's email address

C. The destination email server

D. The use of a TLS cipher

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.357 Which of the following is a best practice when sending a file/data to another individual in anorganization?

A. Encrypt the file but do not compress it

B. When encrypting, split the file: and then compress each file

C. Compress and then encrypt the file.

D. Encrypt and then compress the file.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?