
CySA Module 6 - Software and Hardware Assurance Best Practices
Authored by Jose Manuel Rios
Information Technology (IT)
9th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Thierry wants to implement a method of analyzing network traffic to detect attacks by using a database of known attacks for comparison. Which of the following methods of analysis meets his goal?
Signature analysis
Behavioral analysis
Availability analysis
Anomaly analysis
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security researcher has just been sent a set of files from zero-day malware for analysis. The researcher is concerned about damage to hardware, as the hardware budget for the current fiscal year has been exhausted. Which of the following should the security researcher implement?
Trusted foundry
Fingerprinting
Decomposition
Sandboxing
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security engineer has been brought onto a project for a new system containing several critical files that should never change. However, the team needs to be able to know if a file does change. Which of the following solutions would the security engineer most likely recommend?
Fingerprinting
White box
Sandboxing
Scoping
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A systems administrator works for the U.S. Department of Defense (DoD). She is building out infrastructure to host a new application. Which of the following might she need to reference before ordering any of the hardware to ensure that the hardware and vendor are approved?
OEM documentation
Trusted foundry
Qualitative risk database
Vendor framework
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Jared has created a field in the database that acts as the back end for an application he has written. The field has been configured to store an 8-bit unsigned number. The field where the user enters information has only been configured to accept numbers, but Jared apparently forgot to add logic to ensure that the user could not enter numbers greater than 255. Which of the following could occur as a result of this oversight?
Data overflow
Data truncation
Data corruption
Data loss
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Jaden has received an alert from a system that has identified potential malware on itself. Upon looking through the log files, he sees a list of error messages where an executable tried to write data to a range of memory addresses that did not exist for the system. Which of the following has most likely occurred?
Space overflow
Decimal overflow
Integer overflow
Buffer overflow
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Amadeus is composing a new web application that his organization will make available to the general public. The site will offer users the ability to sign up for accounts and interact with certain functions of the application. Which of the following should he ensure is done as part of the sign-up process?
Input validation
Fuzzing
Static code analysis
Automated reporting
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Soal QuIz SMPIT IF Meningkatkan Kemampuan Berpikir
Quiz
•
9th Grade
15 questions
Kompyuter va Internet haqida savollar
Quiz
•
9th Grade
20 questions
Keterampilan Informatika Kelas 9
Quiz
•
9th Grade
20 questions
KUIS TIK
Quiz
•
9th Grade - University
20 questions
Math G7 Chapter 3 Mastering Significant Figures and Estimation
Quiz
•
7th Grade - University
15 questions
The 7 Soft Skills You Need to Be Successful
Quiz
•
9th Grade
20 questions
Quiz tentang Blok Scratch
Quiz
•
9th Grade - University
16 questions
HTML Level 1
Quiz
•
8th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Information Technology (IT)
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
20 questions
El Verbo IR Practice
Quiz
•
9th Grade
10 questions
Cell Organelles and Their Functions
Interactive video
•
6th - 10th Grade
20 questions
Graphing Inequalities on a Number Line
Quiz
•
6th - 9th Grade
20 questions
Combining Sentences
Lesson
•
9th Grade
22 questions
El Imperfecto
Quiz
•
9th - 12th Grade
20 questions
Box and Whisker Plots
Quiz
•
9th Grade
18 questions
Exponential Growth and Decay
Quiz
•
9th Grade