Rudyard has heard rumors that an employee has set up an FTP server at his house. The server is said to be running on port 80, as ports 20 and 21 are blocked on the company's firewall. He knows that the firewall doesn't perform any sort of packet inspection to ensure that only HTTP traffic is being transmitted. Which of the following tools might he use in conjunction with port mirroring on the switch to monitor the user's traffic and search for signs of FTP traffic being sent on port 80?

CySA Module 10 - Responding to a Cyber Incident

Quiz
•
Information Technology (IT)
•
9th Grade
•
Hard

Jose Manuel Rios
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Peach Fuzzer
Check Point
Metasploit
Wireshark
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Louise has been asked to provide a report to management that contains a list of insecure traffic types coming into the company's network from the Internet. Which of the following tools might she use to collect this information?
Packet analyzer
Nmap
Netstat
Nslookup
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A threat actor has gone to a local coffee shop and opened a program that can analyze traffic being sent and received on the network. He finds that someone on the network is sending emails using SMTP without encryption, and he can see the contents of the emails. Which of the following programs is he most likely using?
Netstat
Dig
Wireshark
Nessus
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Nichole, a cybersecurity analyst, has received an alert about a potential ping flood on one of the company's Windows servers. She is able to connect to the server via an out-of-band management network. Which of the following native tools might help her verify what is occurring on the server at the moment?
Resource Monitor
Tcpdump
Wireshark
Network General
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The security administrator for a large organization wants to prevent customer service employees from being able to access control panels or command prompts. Which of the following could the security administrator implement in order to accomplish this goal?
NAC
Mandatory access control
DAC
Group policy
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Alisi, a cybersecurity manager, has found that a former employee was engaging in illegal activities online; she must report these activities to local law enforcement authorities. She locks the employee's computer in a closet to which only she and two of her peers have access. Which of the following should be created as part of the documentation for this incident?
PII form
PHI tracker
Incident response plan
Chain of custody
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Kevin is working the after-hours shift in the NOC and receives an alert that there has been a potential intrusion into one of the servers. He pulls out the incident response plan and sees that the first step is to notify the on-call manager. Where might he find that information?
Chain of custody
Escalation list
Incident form
Crime tape
Create a free account and access millions of resources
Similar Resources on Quizizz
14 questions
Modul 8

Quiz
•
9th Grade
20 questions
Soal Ulangan Internet 8.7

Quiz
•
8th Grade - University
10 questions
Network secutiry

Quiz
•
9th Grade - University
15 questions
Recap Handout 3 & 4

Quiz
•
6th Grade - University
15 questions
CodeHS Principles of Computing 6.8.1 The Internet Quiz

Quiz
•
9th - 12th Grade
20 questions
ETECH 2ND QUARTER QUIZ

Quiz
•
9th - 12th Grade
15 questions
Quiz 1-15

Quiz
•
9th - 12th Grade
20 questions
Video Game Programming and Design Questions

Quiz
•
9th - 12th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University