NO.301 The security team decides to meet informally to discuss and test the response plan for potential security breaches and emergency situations. Which of the following types of training will the security team perform?
CySA + (301-350)

Quiz
•
Computers
•
KG
•
Easy
cysa cysa
Used 30+ times
FREE Resource
49 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A. Tabletop exercise
B. Red-team attack
C. System assessment implementation
D. Blue-team training
E. White-team engagement
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.302 A company creates digitally signed packages for its devices. Which of the following BEST describes the method by which the security packages are delivered to the company's customers?
A. Trusted firmware updates
B. SELinux
C. eFuse
D. Anti-tamper mechanism
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.303 A security analyst is investigating a reported phishing attempt that was received by many users throughout the company The text of one of the emails is shown below:
Return-Path: <securitty@off1ce365.com>
Received: from [122.167.40.119]
Message-ID: <FE3638ACA.2020509@off1ce365.com>
Date:23 May 2020 11:40:36 -0400
From: security@off1ce365.com
X-Accept-Language: en-us,en
MIME-Version: 1.0
To: Paul Vieira <pvieira@company.com>
Subject: Account Lockout
Content- Type: HTML;
Office 365 User. It looks like you account has been locked out Please click this link and follow the pfompts to restore access Regards. Security Team Due to the size of the company and the high storage requirements, the company does not log DNS requests or perform packet captures of network traffic, but rt does log network flow data Which of the following commands will the analyst most likely execute NEXT?
A. telnet office365.com 25
B. tracert 122.167.40.119
C. curl http:// accountfix-office365.com/login. php
D. nslookup accountfix-office365.com
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.304 A security is reviewing a vulnerability scan report and notes the following finding:
As part of the detection and analysis procedures, which of the following should the analyst do NEXT?
A. Patch or reimage the device to complete the recovery
B. Restart the antiviruses running processes
C. Isolate the host from the network to prevent exposure
D. Confirm the workstation's signatures against the most current signatures.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.305 Which of the following software assessment methods would be BEST for gathering data related to an application's availability during peak times?
A. Security regression testing
B. Stress testing
C. Static analysis testing
D. Dynamic analysis testing
E. User acceptance testing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.306 A system administrator is doing network reconnaissance of a company's external network to determine the vulnerability of various services that are running. Sending some sample traffic to the external host, the administrator obtains the following packet capture:
Based on the output, which of the following services should be further tested for vulnerabilities?
A. SSH
B. HTTP
C. SMB
D. HTTPS
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.307 A cybersecurity analyst is currently checking a newly deployed server that has an access control list applied. When conducting the scan, the analyst received the following code snippet of results:
Which of the following describes the output of this scan?
A. The analyst has discovered a False Positive, and the status code is incorrect providing an OK message.
B. The analyst has discovered a True Positive, and the status code is correct providing a file not found error message.
C. The analyst has discovered a True Positive, and the status code is incorrect providing a forbidden message.
D. The analyst has discovered a False Positive, and the status code is incorrect providing a server error message.
Create a free account and access millions of resources
Similar Resources on Quizizz
48 questions
Sec Study Quiz 5

Quiz
•
Professional Development
47 questions
Year 8 C3 2024 Past Paper

Quiz
•
8th Grade
50 questions
Digital Information Technology: Component 3

Quiz
•
10th Grade
50 questions
CySA+ (51-100)

Quiz
•
KG
48 questions
CySA + (201-250)

Quiz
•
KG
48 questions
CYSA + (251-300)

Quiz
•
KG
50 questions
#01 CISSP: Full Coverage Mastery Exam 1 - Challenging

Quiz
•
Professional Development
50 questions
Quiz 1 Digital Literacy, Careers in IT, Information Technology

Quiz
•
2nd Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade