CySA + (301-350)

CySA + (301-350)

KG

49 Qs

quiz-placeholder

Similar activities

MCTCC0113

MCTCC0113

University

50 Qs

CYSA + (351-400)

CYSA + (351-400)

KG

49 Qs

#3 CIW Data Analyst - Certification Prep

#3 CIW Data Analyst - Certification Prep

9th Grade - University

54 Qs

Information and Technology Career Cluster

Information and Technology Career Cluster

8th Grade

50 Qs

Information Technology Specialist

Information Technology Specialist

8th Grade

50 Qs

GRADE 11 QUIZ ON COMPUTER JOBS

GRADE 11 QUIZ ON COMPUTER JOBS

5th Grade

50 Qs

(Part 2) Cloud Essentials Study Guide

(Part 2) Cloud Essentials Study Guide

Professional Development

48 Qs

Data Security and Excel

Data Security and Excel

9th - 10th Grade

50 Qs

CySA + (301-350)

CySA + (301-350)

Assessment

Quiz

Computers

KG

Easy

Created by

cysa cysa

Used 30+ times

FREE Resource

49 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.301 The security team decides to meet informally to discuss and test the response plan for potential security breaches and emergency situations. Which of the following types of training will the security team perform?

A. Tabletop exercise

B. Red-team attack

C. System assessment implementation

D. Blue-team training

E. White-team engagement

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.302 A company creates digitally signed packages for its devices. Which of the following BEST describes the method by which the security packages are delivered to the company's customers?

A. Trusted firmware updates

B. SELinux

C. eFuse

D. Anti-tamper mechanism

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.303 A security analyst is investigating a reported phishing attempt that was received by many users throughout the company The text of one of the emails is shown below:

Return-Path: <securitty@off1ce365.com>

Received: from [122.167.40.119]

Message-ID: <FE3638ACA.2020509@off1ce365.com>

Date:23 May 2020 11:40:36 -0400

From: security@off1ce365.com

X-Accept-Language: en-us,en

MIME-Version: 1.0

To: Paul Vieira <pvieira@company.com>

Subject: Account Lockout

Content- Type: HTML;

Office 365 User. It looks like you account has been locked out Please click this link and follow the pfompts to restore access Regards. Security Team Due to the size of the company and the high storage requirements, the company does not log DNS requests or perform packet captures of network traffic, but rt does log network flow data Which of the following commands will the analyst most likely execute NEXT?

A. telnet office365.com 25

B. tracert 122.167.40.119

C. curl http:// accountfix-office365.com/login. php

D. nslookup accountfix-office365.com

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

NO.304 A security is reviewing a vulnerability scan report and notes the following finding:

As part of the detection and analysis procedures, which of the following should the analyst do NEXT?

A. Patch or reimage the device to complete the recovery

B. Restart the antiviruses running processes

C. Isolate the host from the network to prevent exposure

D. Confirm the workstation's signatures against the most current signatures.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.305 Which of the following software assessment methods would be BEST for gathering data related to an application's availability during peak times?

A. Security regression testing

B. Stress testing

C. Static analysis testing

D. Dynamic analysis testing

E. User acceptance testing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

NO.306 A system administrator is doing network reconnaissance of a company's external network to determine the vulnerability of various services that are running. Sending some sample traffic to the external host, the administrator obtains the following packet capture:

Based on the output, which of the following services should be further tested for vulnerabilities?

A. SSH

B. HTTP

C. SMB

D. HTTPS

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

NO.307 A cybersecurity analyst is currently checking a newly deployed server that has an access control list applied. When conducting the scan, the analyst received the following code snippet of results:

Which of the following describes the output of this scan?

A. The analyst has discovered a False Positive, and the status code is incorrect providing an OK message.

B. The analyst has discovered a True Positive, and the status code is correct providing a file not found error message.

C. The analyst has discovered a True Positive, and the status code is incorrect providing a forbidden message.

D. The analyst has discovered a False Positive, and the status code is incorrect providing a server error message.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?