CAS-004 - Set 7 (1of2)

CAS-004 - Set 7 (1of2)

University

10 Qs

quiz-placeholder

Similar activities

Network Security and Cybersecurity Quiz

Network Security and Cybersecurity Quiz

9th Grade - University

11 Qs

CSI

CSI

University

9 Qs

CNET236 Chapt 15 Adv Management Tools

CNET236 Chapt 15 Adv Management Tools

University

10 Qs

Cloud Computing

Cloud Computing

University - Professional Development

10 Qs

Cloud Computing

Cloud Computing

University

10 Qs

Cloud Computing

Cloud Computing

University

11 Qs

COMPUTER BASICS

COMPUTER BASICS

University

10 Qs

WAMP Server

WAMP Server

University

10 Qs

CAS-004 - Set 7 (1of2)

CAS-004 - Set 7 (1of2)

Assessment

Quiz

Computers

University

Hard

Created by

Khairul Imtiyaz

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

On which of the following devices and processes did the ransomware originate?

cpt-ws002, NO-AV.exe

cpt-ws026, DearCry.exe

cpt-ws018, powershell.exe

cpt-ws026, NO-AV.exe

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following solutions should the security architect recommend to reduce the time required to validate the certificate?

Implementing OCSP stapling on the server

Changing the cipher algorithm used on the web server

Upgrading to TLS 1.3

Adding more nodes to the web server clusters

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following should the security analyst have followed to prevent the loss of potentially useful evidence during a security incident investigation?

Verification

Chain of custody

Secure storage

Order of volatility

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following should the security administrator implement to detect a potential forged sender claim in the envelope of an email? (Select TWO)

DMARC

SPF

S/MIME

TLS

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following will need to be implemented to achieve the transition to a zero trust architecture? (Select THREE)

Continuous validation

Policy automation

Least privilege

Firewall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following should the security analyst implement when considering mutual authentication?

A common private key on each endpoint

A common public key on each endpoint

Public keys on both endpoints

Perfect forward secrecy on both endpoints

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes the system responsible for storing private encryption/decryption files with a third party to ensure these files are stored safely?

Code signing

Trust models

TPM

Key escrow

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers