
Mock Exam 1 (Ian Neil)
Authored by SBS TS
Computers
Professional Development
Used 17+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
56 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
You work for a ticketing company that sells the best theater tickets in London. Your office holds an emergency supply of 150 tickets that take two hours to sell. What is the terminology for this two-hour period, and what must happen before the two hours expire? Choose the BEST TWO answers.
The two-hour period is the RTO.
The two-hour period is the RPO.
The event that must happen before the two-hour period expires is the RTO.
The event that must happen before the two-hour period expires is the RPO.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are an administrator for a college that has 10 intranet web servers, and you need to install an X509 certificate so that they can support HTTPS. You need to use the solution that is the most cost-effective. Which of the following will you use for the certificates?
Wildcard
Domain
Self-signed
SAN
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A group of chartered accountants visited the website belonging to their institution last Friday and were attacked by malware. What type of attack were they the victim of?
Social Engineering
Watering Hole Attack
Remote Access Trojan
Cross-Site Scripting
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cybersecurity analyst notices the following information in one of the log files on the company web server:
GET http://www.website.com.br/get-files../../../..etc/ passwd
What type of attack has the analyst just discovered?
Banner Grabbing
CSRF
XSS
Directory Traversal
SSL Stripping
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following threat intelligence sources is likely to provide much more accurate data?
OSINT
Public/private information sharing centers
Closed/proprietary
Threat maps
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cybersecurity administrator wants to add comments to a log file that they are monitoring. Which tool is best for this?
Nmap
Head
Logger
Tail
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cybersecurity analyst has noticed a suspicious transaction on the server that holds the financial data. The output from the log file shows the following:
Get http://yourbank.com/transfer.do?acctnum=087646958&amount+80000 HTTP 1.1
Get http://yourbank.com/transfer.do?acctnum=087646958&amount+200000 HTTP 1.1
Get http://yourbank.com/transfer.do?acctnum=087646958&amount+25000 HTTP 1.1
Get http://yourbank.com/transfer.do?acctnum=087646958&amount+10000 HTTP 1.1
What type of attack has the analyst just discovered?
Ransomware
XSS
Social Engineering
CSRF
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?