uC CS0-003 Q1

uC CS0-003 Q1

University

40 Qs

quiz-placeholder

Similar activities

A+ Module 4 Review

A+ Module 4 Review

University

38 Qs

105p2 Final Revew

105p2 Final Revew

10th Grade - Professional Development

42 Qs

3) 207.3 Securing a DNS server

3) 207.3 Securing a DNS server

University

37 Qs

Nerds quiz

Nerds quiz

University

40 Qs

Quiz 2 - Cloud Infrastructure and Virtualization

Quiz 2 - Cloud Infrastructure and Virtualization

University

35 Qs

Cloud Essentials

Cloud Essentials

8th Grade - University

40 Qs

ISC2 - CC - Chapter 1 - Module 2

ISC2 - CC - Chapter 1 - Module 2

University

35 Qs

Understanding Security and Maintenance

Understanding Security and Maintenance

8th Grade - University

40 Qs

uC CS0-003 Q1

uC CS0-003 Q1

Assessment

Quiz

Computers

University

Hard

Created by

Jose Manuel Rios

Used 7+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An incident response report discovers a virus introduced through a remote host connected to corporate resources. A cybersecurity analyst has been asked for a

" recommendation to solve this issue. Which of the following should the cybersecurity analyst apply in the given scenario?

VPN

SIEM

NAC

MAC

Answer explanation

NAC

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are the major categories of security event indicators described by NIST 800-61?

Each correct answer represents a complete solution. Choose all that apply.

Internal and external sources

Alerts from IDS, IPS, SIEM, AV, and other security systems

Logs generated by systems, services, and applications

Exploit developers

Answer explanation

NIST

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which incident response metric measures the time from detection to assessing the event as an incident and activating the process?

Mean time to respond

Mean time to detect

Mean time to remediate

None of these

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Jack received an unknown call from a girl saying she was a customer executive calling from an XYZ bank. She informed Jack that he had won a prize of $2000, and the same amount would be transferred to his account as he is one of the prime customers of this bank. She requested that Jack confirm his debit card details for this amount transfer. In the given scenario, the girl is playing which threat actor role?

Hacktivist

Organized crime

Nation-state

Insider threat

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Joe, an investigator, wants to scan a hard drive to view the deleted communication. Which of the following tools should Joe use to accomplish the given task?

EnCase

Helix3

Wireshark

FTK

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Jordan, a white hat hacker, observes an inaccurate alert triggered by an intrusion prevention system (IPS). Which type of event has occurred in the scenario?

True negative

True positive

False negative

False positive

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Olivia has requested that her development team run their web application security testing tools against their web applications, despite the fact that they just installed the most recent patches. What is this type of testing called?

Patch validation

Regression testing

HTTP checking

WAV testing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?