CYSA 21-30

CYSA 21-30

Professional Development

10 Qs

quiz-placeholder

Similar activities

Vulnerability Management

Vulnerability Management

Professional Development

9 Qs

การออกแบบส่วนติดต่อผู้ใช้

การออกแบบส่วนติดต่อผู้ใช้

Professional Development

10 Qs

QUIZ 1

QUIZ 1

Professional Development

15 Qs

SOF Day 1 Review

SOF Day 1 Review

Professional Development

12 Qs

Latihan Soal Domain 1 dan 2 PMI-PBA Bank BTN

Latihan Soal Domain 1 dan 2 PMI-PBA Bank BTN

Professional Development

10 Qs

Creación de formularios con CDS anotaciones y envío de email

Creación de formularios con CDS anotaciones y envío de email

Professional Development

10 Qs

ICT Skill Development

ICT Skill Development

Professional Development

15 Qs

It jobs

It jobs

Professional Development

15 Qs

CYSA 21-30

CYSA 21-30

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Eric Nelson

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization recently changed its BC and DR plans. Which of the following would best allow for the incident response team to test the changes without any impact to the business?

Perform a tabletop drill based on previously identified incident scenarios.

Simulate an incident by shutting down power to the primary data center.

Migrate active workloads from the primary data center to the secondary location.

Compare the current plan to lessons learned from previous incidents.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a cybersecurity incident, one of the web servers at the perimeter network was affected by ransomware. Which of the following actions should be performed immediately?

Shut down the server.

Reimage the server.

Quarantine the server.

Update the OS to latest version.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst reviews the latest vulnerability scans and observes there are vulnerabilities with similar CVSSv3 scores but different base score metrics. Which of the following attack vectors should the analyst remediate first?

CVSSv3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSSv3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A security analyst must review a suspicious email to determine its legitimacy. Which of the following should be performed? (Choose two.)

Evaluate scoring fields, such as Spam Confidence Level and Bulk Complaint Level

Review the headers from the forwarded email

Examine the recipient address field

Examine the SPF, DKIM, and DMARC fields from the original email

Review the Content-Type header

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization was compromised, and the usernames and passwords of all employees were leaked online. Which of the following best describes the remediation that could reduce the impact of this situation?

Multifactor authentication

Password changes

System hardening

Password encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the remediation that could reduce the impact of this situation?

Integrate an IT service delivery ticketing system to track remediation and closure

Create a compensating control item until the system can be fully patched

Accept the risk and decommission current assets as end of life

Request an exception and manually patch each system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would help an analyst to quickly find out whether the IP address in a SIEM is a known-malicious IP address?

Join an information sharing and analysis center specific to the company's industry

Upload threat intelligence to the IPS in STIX/TAXII format

Add data enrichment for IPs in the ingestion pipeline

Review threat feeds after viewing the SIEM alert

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?