
CySA + (301-350)
Authored by cysa cysa
Computers
KG
Used 30+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
49 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.301 The security team decides to meet informally to discuss and test the response plan for potential security breaches and emergency situations. Which of the following types of training will the security team perform?
A. Tabletop exercise
B. Red-team attack
C. System assessment implementation
D. Blue-team training
E. White-team engagement
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.302 A company creates digitally signed packages for its devices. Which of the following BEST describes the method by which the security packages are delivered to the company's customers?
A. Trusted firmware updates
B. SELinux
C. eFuse
D. Anti-tamper mechanism
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.303 A security analyst is investigating a reported phishing attempt that was received by many users throughout the company The text of one of the emails is shown below:
Return-Path: <securitty@off1ce365.com>
Received: from [122.167.40.119]
Message-ID: <FE3638ACA.2020509@off1ce365.com>
Date:23 May 2020 11:40:36 -0400
From: security@off1ce365.com
X-Accept-Language: en-us,en
MIME-Version: 1.0
To: Paul Vieira <pvieira@company.com>
Subject: Account Lockout
Content- Type: HTML;
Office 365 User. It looks like you account has been locked out Please click this link and follow the pfompts to restore access Regards. Security Team Due to the size of the company and the high storage requirements, the company does not log DNS requests or perform packet captures of network traffic, but rt does log network flow data Which of the following commands will the analyst most likely execute NEXT?
A. telnet office365.com 25
B. tracert 122.167.40.119
C. curl http:// accountfix-office365.com/login. php
D. nslookup accountfix-office365.com
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.304 A security is reviewing a vulnerability scan report and notes the following finding:
As part of the detection and analysis procedures, which of the following should the analyst do NEXT?
A. Patch or reimage the device to complete the recovery
B. Restart the antiviruses running processes
C. Isolate the host from the network to prevent exposure
D. Confirm the workstation's signatures against the most current signatures.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.305 Which of the following software assessment methods would be BEST for gathering data related to an application's availability during peak times?
A. Security regression testing
B. Stress testing
C. Static analysis testing
D. Dynamic analysis testing
E. User acceptance testing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.306 A system administrator is doing network reconnaissance of a company's external network to determine the vulnerability of various services that are running. Sending some sample traffic to the external host, the administrator obtains the following packet capture:
Based on the output, which of the following services should be further tested for vulnerabilities?
A. SSH
B. HTTP
C. SMB
D. HTTPS
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.307 A cybersecurity analyst is currently checking a newly deployed server that has an access control list applied. When conducting the scan, the analyst received the following code snippet of results:
Which of the following describes the output of this scan?
A. The analyst has discovered a False Positive, and the status code is incorrect providing an OK message.
B. The analyst has discovered a True Positive, and the status code is correct providing a file not found error message.
C. The analyst has discovered a True Positive, and the status code is incorrect providing a forbidden message.
D. The analyst has discovered a False Positive, and the status code is incorrect providing a server error message.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
51 questions
សំណួរ
Quiz
•
9th Grade
50 questions
Asesmen Tengah semester Mapel Informatika
Quiz
•
7th Grade
45 questions
CMO : Chapter 1
Quiz
•
KG
47 questions
G6 - Ôn thi Tin học (Cánh Diều) - Cuối HK2
Quiz
•
6th Grade
49 questions
Codehs
Quiz
•
11th Grade
50 questions
ppt_kelas XII
Quiz
•
12th Grade
50 questions
3. Hardware - Input & Output Devices: Computer Science CIE IGCSE
Quiz
•
10th Grade
45 questions
Ôn tập HKI Tin học 4
Quiz
•
KG - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Place Value
Quiz
•
KG - 3rd Grade
10 questions
Sound Energy Assessment
Quiz
•
KG - 2nd Grade
10 questions
Dr. Seuss
Quiz
•
KG - 5th Grade
20 questions
greater than less than equal to
Quiz
•
KG - 1st Grade
6 questions
Copy of G5_U6_L3_22-23
Lesson
•
KG - Professional Dev...
20 questions
Capitalization in sentences
Quiz
•
KG - 4th Grade
15 questions
Simple Patterns AB, ABB, ABC
Quiz
•
KG - 1st Grade