CySA Module 10 - Responding to a Cyber Incident

CySA Module 10 - Responding to a Cyber Incident

9th Grade

15 Qs

quiz-placeholder

Similar activities

Struktur Data 2

Struktur Data 2

9th Grade

20 Qs

Gò Nổi HK 2-Tin Học 5

Gò Nổi HK 2-Tin Học 5

5th Grade - University

14 Qs

Avaliação 9º anos

Avaliação 9º anos

9th Grade

10 Qs

Caesar Cipher

Caesar Cipher

7th Grade - University

10 Qs

Data Literacy Quizizz

Data Literacy Quizizz

6th Grade - University

15 Qs

Quiz Informatika 9.1

Quiz Informatika 9.1

9th Grade

20 Qs

Practica XR

Practica XR

9th - 12th Grade

10 Qs

Quiz sobre la Historia de la Computadora

Quiz sobre la Historia de la Computadora

9th Grade - University

15 Qs

CySA Module 10 - Responding to a Cyber Incident

CySA Module 10 - Responding to a Cyber Incident

Assessment

Quiz

Information Technology (IT)

9th Grade

Practice Problem

Hard

Created by

Jose Manuel Rios

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rudyard has heard rumors that an employee has set up an FTP server at his house. The server is said to be running on port 80, as ports 20 and 21 are blocked on the company's firewall. He knows that the firewall doesn't perform any sort of packet inspection to ensure that only HTTP traffic is being transmitted. Which of the following tools might he use in conjunction with port mirroring on the switch to monitor the user's traffic and search for signs of FTP traffic being sent on port 80?

Peach Fuzzer

Check Point

Metasploit

Wireshark

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Louise has been asked to provide a report to management that contains a list of insecure traffic types coming into the company's network from the Internet. Which of the following tools might she use to collect this information?

Packet analyzer

Nmap

Netstat

Nslookup

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor has gone to a local coffee shop and opened a program that can analyze traffic being sent and received on the network. He finds that someone on the network is sending emails using SMTP without encryption, and he can see the contents of the emails. Which of the following programs is he most likely using?

Netstat

Dig

Wireshark

Nessus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Nichole, a cybersecurity analyst, has received an alert about a potential ping flood on one of the company's Windows servers. She is able to connect to the server via an out-of-band management network. Which of the following native tools might help her verify what is occurring on the server at the moment?

Resource Monitor

Tcpdump

Wireshark

Network General

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The security administrator for a large organization wants to prevent customer service employees from being able to access control panels or command prompts. Which of the following could the security administrator implement in order to accomplish this goal?

NAC

Mandatory access control

DAC

Group policy

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alisi, a cybersecurity manager, has found that a former employee was engaging in illegal activities online; she must report these activities to local law enforcement authorities. She locks the employee's computer in a closet to which only she and two of her peers have access. Which of the following should be created as part of the documentation for this incident?

PII form

PHI tracker

Incident response plan

Chain of custody

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kevin is working the after-hours shift in the NOC and receives an alert that there has been a potential intrusion into one of the servers. He pulls out the incident response plan and sees that the first step is to notify the on-call manager. Where might he find that information?

Chain of custody

Escalation list

Incident form

Crime tape

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?