CySA Module 10 - Responding to a Cyber Incident

CySA Module 10 - Responding to a Cyber Incident

9th Grade

15 Qs

quiz-placeholder

Similar activities

Networking Protocols Quiz

Networking Protocols Quiz

9th - 12th Grade

12 Qs

Cyber Security Quiz

Cyber Security Quiz

9th Grade

11 Qs

CM- U2L4 - Exploring Windows OS Features

CM- U2L4 - Exploring Windows OS Features

9th Grade - University

20 Qs

Network Protocols Quiz

Network Protocols Quiz

9th Grade

18 Qs

Networking Quiz - OSI Model and Protocols

Networking Quiz - OSI Model and Protocols

9th Grade

17 Qs

Understanding Network Design

Understanding Network Design

9th - 12th Grade

15 Qs

Network secutiry

Network secutiry

9th Grade - University

10 Qs

CY4U2 Compliance Pretest

CY4U2 Compliance Pretest

9th - 12th Grade

10 Qs

CySA Module 10 - Responding to a Cyber Incident

CySA Module 10 - Responding to a Cyber Incident

Assessment

Quiz

Information Technology (IT)

9th Grade

Hard

Created by

Jose Manuel Rios

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rudyard has heard rumors that an employee has set up an FTP server at his house. The server is said to be running on port 80, as ports 20 and 21 are blocked on the company's firewall. He knows that the firewall doesn't perform any sort of packet inspection to ensure that only HTTP traffic is being transmitted. Which of the following tools might he use in conjunction with port mirroring on the switch to monitor the user's traffic and search for signs of FTP traffic being sent on port 80?

Peach Fuzzer

Check Point

Metasploit

Wireshark

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Louise has been asked to provide a report to management that contains a list of insecure traffic types coming into the company's network from the Internet. Which of the following tools might she use to collect this information?

Packet analyzer

Nmap

Netstat

Nslookup

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor has gone to a local coffee shop and opened a program that can analyze traffic being sent and received on the network. He finds that someone on the network is sending emails using SMTP without encryption, and he can see the contents of the emails. Which of the following programs is he most likely using?

Netstat

Dig

Wireshark

Nessus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Nichole, a cybersecurity analyst, has received an alert about a potential ping flood on one of the company's Windows servers. She is able to connect to the server via an out-of-band management network. Which of the following native tools might help her verify what is occurring on the server at the moment?

Resource Monitor

Tcpdump

Wireshark

Network General

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The security administrator for a large organization wants to prevent customer service employees from being able to access control panels or command prompts. Which of the following could the security administrator implement in order to accomplish this goal?

NAC

Mandatory access control

DAC

Group policy

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alisi, a cybersecurity manager, has found that a former employee was engaging in illegal activities online; she must report these activities to local law enforcement authorities. She locks the employee's computer in a closet to which only she and two of her peers have access. Which of the following should be created as part of the documentation for this incident?

PII form

PHI tracker

Incident response plan

Chain of custody

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kevin is working the after-hours shift in the NOC and receives an alert that there has been a potential intrusion into one of the servers. He pulls out the incident response plan and sees that the first step is to notify the on-call manager. Where might he find that information?

Chain of custody

Escalation list

Incident form

Crime tape

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?