Search Header Logo

uC CS0-003 Q1

Authored by Jose Manuel Rios

Computers

University

Used 7+ times

uC CS0-003 Q1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An incident response report discovers a virus introduced through a remote host connected to corporate resources. A cybersecurity analyst has been asked for a

" recommendation to solve this issue. Which of the following should the cybersecurity analyst apply in the given scenario?

VPN

SIEM

NAC

MAC

Answer explanation

NAC

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are the major categories of security event indicators described by NIST 800-61?

Each correct answer represents a complete solution. Choose all that apply.

Internal and external sources

Alerts from IDS, IPS, SIEM, AV, and other security systems

Logs generated by systems, services, and applications

Exploit developers

Answer explanation

NIST

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which incident response metric measures the time from detection to assessing the event as an incident and activating the process?

Mean time to respond

Mean time to detect

Mean time to remediate

None of these

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Jack received an unknown call from a girl saying she was a customer executive calling from an XYZ bank. She informed Jack that he had won a prize of $2000, and the same amount would be transferred to his account as he is one of the prime customers of this bank. She requested that Jack confirm his debit card details for this amount transfer. In the given scenario, the girl is playing which threat actor role?

Hacktivist

Organized crime

Nation-state

Insider threat

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Joe, an investigator, wants to scan a hard drive to view the deleted communication. Which of the following tools should Joe use to accomplish the given task?

EnCase

Helix3

Wireshark

FTK

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Jordan, a white hat hacker, observes an inaccurate alert triggered by an intrusion prevention system (IPS). Which type of event has occurred in the scenario?

True negative

True positive

False negative

False positive

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Olivia has requested that her development team run their web application security testing tools against their web applications, despite the fact that they just installed the most recent patches. What is this type of testing called?

Patch validation

Regression testing

HTTP checking

WAV testing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?