
SPQ5
Authored by Caitrin Catalan-Padilla
Fun
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
31 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A SOC is currently being outsourced. Which of the following is being used?
Microservices
SaaS
MSSP
PaaS
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security analyst is investigating a phishing email that contains a malicious document directed to the company's Chief Executive Officer (CEO). Which of the following should the analyst perform to understand the threat and retrieve possible IoCs?
Run a vulnerability scan against the CEOs computer to find possible vulnerabilities
Install a sandbox to run the malicious payload in a safe environment
Perform a traceroute to identify the communication path
Use netstat to check whether communication has been made with a remote host
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following controls would BEST identify and report malicious insider activities?
An intrusion detection system
A proxy
Audit trails
Strong authentication
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A user's PC was recently infected by malware. The user has a legacy printer without vendor support, and the user's OS is fully patched. The user downloaded a driver package from the internet. No threats were found on the downloaded file, but during file installation, a malicious runtime threat was detected. Which of the following is MOST likely cause of the infection?
The driver has malware installed and was refactored upon download to avoid detection.
The user's computer has a rootkit installed that has avoided detection until the new driver overwrote key files.
The user's antivirus software definition were out of date and were damaged by the installation of the driver
The user's computer has been infected with a logic bomb set to run when new driver was installed.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A company's cybersecurity department is looking for a new solution to maintain high availability. Which of the following can be utilized to build a solution? (Select Two)
A stateful inspection
IP hashes
A round robin
A VLAN
A DMZ
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A network analyst is investigating compromised corporate information. The analyst leads to a theory that network traffic was intercepted before being transmitted to the internet. The following output was captured on an internal host. (See attached image)
Based on the IoCS, which of the following was the MOST likely attack used to compromise the network communication?
Denial of service
ARP poisoning
Command injection
MAC flooding
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Users reported several suspicious activities within the last two weeks that resulted in several unauthorized transactions. Upon investigation, the security analyst found the following. (See attached image) Multiple reports of breached credentials within that time period Traffic being redirected in certain parts of the network Fraudulent emails being sent by various internal users without their consent Which of the following types of attacks was MOST likely used?
Replay attack
Race condition
Cross site scripting
Request forgeries
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade