
CySA + (301-350)
Authored by cysa cysa
Computers
KG
Used 30+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
49 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.301 The security team decides to meet informally to discuss and test the response plan for potential security breaches and emergency situations. Which of the following types of training will the security team perform?
A. Tabletop exercise
B. Red-team attack
C. System assessment implementation
D. Blue-team training
E. White-team engagement
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.302 A company creates digitally signed packages for its devices. Which of the following BEST describes the method by which the security packages are delivered to the company's customers?
A. Trusted firmware updates
B. SELinux
C. eFuse
D. Anti-tamper mechanism
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.303 A security analyst is investigating a reported phishing attempt that was received by many users throughout the company The text of one of the emails is shown below:
Return-Path: <securitty@off1ce365.com>
Received: from [122.167.40.119]
Message-ID: <FE3638ACA.2020509@off1ce365.com>
Date:23 May 2020 11:40:36 -0400
From: security@off1ce365.com
X-Accept-Language: en-us,en
MIME-Version: 1.0
To: Paul Vieira <pvieira@company.com>
Subject: Account Lockout
Content- Type: HTML;
Office 365 User. It looks like you account has been locked out Please click this link and follow the pfompts to restore access Regards. Security Team Due to the size of the company and the high storage requirements, the company does not log DNS requests or perform packet captures of network traffic, but rt does log network flow data Which of the following commands will the analyst most likely execute NEXT?
A. telnet office365.com 25
B. tracert 122.167.40.119
C. curl http:// accountfix-office365.com/login. php
D. nslookup accountfix-office365.com
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.304 A security is reviewing a vulnerability scan report and notes the following finding:
As part of the detection and analysis procedures, which of the following should the analyst do NEXT?
A. Patch or reimage the device to complete the recovery
B. Restart the antiviruses running processes
C. Isolate the host from the network to prevent exposure
D. Confirm the workstation's signatures against the most current signatures.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.305 Which of the following software assessment methods would be BEST for gathering data related to an application's availability during peak times?
A. Security regression testing
B. Stress testing
C. Static analysis testing
D. Dynamic analysis testing
E. User acceptance testing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.306 A system administrator is doing network reconnaissance of a company's external network to determine the vulnerability of various services that are running. Sending some sample traffic to the external host, the administrator obtains the following packet capture:
Based on the output, which of the following services should be further tested for vulnerabilities?
A. SSH
B. HTTP
C. SMB
D. HTTPS
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.307 A cybersecurity analyst is currently checking a newly deployed server that has an access control list applied. When conducting the scan, the analyst received the following code snippet of results:
Which of the following describes the output of this scan?
A. The analyst has discovered a False Positive, and the status code is incorrect providing an OK message.
B. The analyst has discovered a True Positive, and the status code is correct providing a file not found error message.
C. The analyst has discovered a True Positive, and the status code is incorrect providing a forbidden message.
D. The analyst has discovered a False Positive, and the status code is incorrect providing a server error message.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
52 questions
Ôn tập cuối kì 2
Quiz
•
KG
50 questions
USBN TIK KELAS 9A-9C
Quiz
•
9th Grade - University
50 questions
BASISDATA RPL
Quiz
•
12th Grade
50 questions
LATIHAN PAT INFORMATIKA KELAS X
Quiz
•
9th - 12th Grade
50 questions
Ôn tập HK II - TIN 8
Quiz
•
8th Grade
50 questions
UHB INFORMATIKA XI
Quiz
•
11th Grade
50 questions
Unit 3 - Connections
Quiz
•
1st Grade
48 questions
Tin 10_cấu trúc rẽ nhánh IF
Quiz
•
10th Grade
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
12 questions
Presidents' Day
Quiz
•
KG - 5th Grade
11 questions
FOREST Growth Mindset
Lesson
•
KG
10 questions
THEME
Quiz
•
KG - University
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
10 questions
Add & Subtract Mixed Numbers with Like Denominators
Quiz
•
KG - University
10 questions
Long i- igh, ie, and y Quiz
Quiz
•
KG - 3rd Grade
10 questions
2D & 3D Shapes
Quiz
•
KG
20 questions
Capitalization in sentences
Quiz
•
KG - 4th Grade