
CySA Module 10 - Responding to a Cyber Incident
Authored by Jose Manuel Rios
Information Technology (IT)
9th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Rudyard has heard rumors that an employee has set up an FTP server at his house. The server is said to be running on port 80, as ports 20 and 21 are blocked on the company's firewall. He knows that the firewall doesn't perform any sort of packet inspection to ensure that only HTTP traffic is being transmitted. Which of the following tools might he use in conjunction with port mirroring on the switch to monitor the user's traffic and search for signs of FTP traffic being sent on port 80?
Peach Fuzzer
Check Point
Metasploit
Wireshark
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Louise has been asked to provide a report to management that contains a list of insecure traffic types coming into the company's network from the Internet. Which of the following tools might she use to collect this information?
Packet analyzer
Nmap
Netstat
Nslookup
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A threat actor has gone to a local coffee shop and opened a program that can analyze traffic being sent and received on the network. He finds that someone on the network is sending emails using SMTP without encryption, and he can see the contents of the emails. Which of the following programs is he most likely using?
Netstat
Dig
Wireshark
Nessus
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Nichole, a cybersecurity analyst, has received an alert about a potential ping flood on one of the company's Windows servers. She is able to connect to the server via an out-of-band management network. Which of the following native tools might help her verify what is occurring on the server at the moment?
Resource Monitor
Tcpdump
Wireshark
Network General
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The security administrator for a large organization wants to prevent customer service employees from being able to access control panels or command prompts. Which of the following could the security administrator implement in order to accomplish this goal?
NAC
Mandatory access control
DAC
Group policy
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Alisi, a cybersecurity manager, has found that a former employee was engaging in illegal activities online; she must report these activities to local law enforcement authorities. She locks the employee's computer in a closet to which only she and two of her peers have access. Which of the following should be created as part of the documentation for this incident?
PII form
PHI tracker
Incident response plan
Chain of custody
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Kevin is working the after-hours shift in the NOC and receives an alert that there has been a potential intrusion into one of the servers. He pulls out the incident response plan and sees that the first step is to notify the on-call manager. Where might he find that information?
Chain of custody
Escalation list
Incident form
Crime tape
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?