NO.301 The security team decides to meet informally to discuss and test the response plan for potential security breaches and emergency situations. Which of the following types of training will the security team perform?
CySA + (301-350)

Quiz
•
Computers
•
KG
•
Easy
cysa cysa
Used 30+ times
FREE Resource
49 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A. Tabletop exercise
B. Red-team attack
C. System assessment implementation
D. Blue-team training
E. White-team engagement
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.302 A company creates digitally signed packages for its devices. Which of the following BEST describes the method by which the security packages are delivered to the company's customers?
A. Trusted firmware updates
B. SELinux
C. eFuse
D. Anti-tamper mechanism
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.303 A security analyst is investigating a reported phishing attempt that was received by many users throughout the company The text of one of the emails is shown below:
Return-Path: <securitty@off1ce365.com>
Received: from [122.167.40.119]
Message-ID: <FE3638ACA.2020509@off1ce365.com>
Date:23 May 2020 11:40:36 -0400
From: security@off1ce365.com
X-Accept-Language: en-us,en
MIME-Version: 1.0
To: Paul Vieira <pvieira@company.com>
Subject: Account Lockout
Content- Type: HTML;
Office 365 User. It looks like you account has been locked out Please click this link and follow the pfompts to restore access Regards. Security Team Due to the size of the company and the high storage requirements, the company does not log DNS requests or perform packet captures of network traffic, but rt does log network flow data Which of the following commands will the analyst most likely execute NEXT?
A. telnet office365.com 25
B. tracert 122.167.40.119
C. curl http:// accountfix-office365.com/login. php
D. nslookup accountfix-office365.com
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.304 A security is reviewing a vulnerability scan report and notes the following finding:
As part of the detection and analysis procedures, which of the following should the analyst do NEXT?
A. Patch or reimage the device to complete the recovery
B. Restart the antiviruses running processes
C. Isolate the host from the network to prevent exposure
D. Confirm the workstation's signatures against the most current signatures.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.305 Which of the following software assessment methods would be BEST for gathering data related to an application's availability during peak times?
A. Security regression testing
B. Stress testing
C. Static analysis testing
D. Dynamic analysis testing
E. User acceptance testing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.306 A system administrator is doing network reconnaissance of a company's external network to determine the vulnerability of various services that are running. Sending some sample traffic to the external host, the administrator obtains the following packet capture:
Based on the output, which of the following services should be further tested for vulnerabilities?
A. SSH
B. HTTP
C. SMB
D. HTTPS
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.307 A cybersecurity analyst is currently checking a newly deployed server that has an access control list applied. When conducting the scan, the analyst received the following code snippet of results:
Which of the following describes the output of this scan?
A. The analyst has discovered a False Positive, and the status code is incorrect providing an OK message.
B. The analyst has discovered a True Positive, and the status code is correct providing a file not found error message.
C. The analyst has discovered a True Positive, and the status code is incorrect providing a forbidden message.
D. The analyst has discovered a False Positive, and the status code is incorrect providing a server error message.
Create a free account and access millions of resources
Similar Resources on Quizizz
45 questions
A+ 1102 Study Quiz 3

Quiz
•
Professional Development
50 questions
IAS2-NW3A

Quiz
•
University
50 questions
Term 03 - Grade 8 Revision

Quiz
•
8th Grade
50 questions
GRADE 11 QUIZ ON COMPUTER JOBS

Quiz
•
5th Grade
50 questions
Software engineering MCQ Test 1

Quiz
•
University
44 questions
CMO: Chapter 3

Quiz
•
KG
54 questions
Grade 6 ICT Review - Noah

Quiz
•
8th Grade - University
46 questions
CompTIA ITFundamentals CRAM

Quiz
•
6th Grade - University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Identifying equations

Quiz
•
KG - University
15 questions
Music 2016

Quiz
•
KG - 12th Grade
44 questions
logos

Quiz
•
KG - University
20 questions
Disney Characters

Quiz
•
KG
20 questions
Kids shows

Quiz
•
KG
20 questions
Guess that Disney

Quiz
•
KG - 5th Grade
20 questions
Cartoon Characters!

Quiz
•
KG - 5th Grade