CCST Cybersecurity: Objective 3

CCST Cybersecurity: Objective 3

12th Grade

8 Qs

quiz-placeholder

Similar activities

4.2 - Operating Systems

4.2 - Operating Systems

9th - 12th Grade

12 Qs

Proxy Server

Proxy Server

12th Grade

10 Qs

ABS system quiz

ABS system quiz

9th - 12th Grade

10 Qs

IT QUIZ

IT QUIZ

10th - 12th Grade

10 Qs

peranan sistem operasi

peranan sistem operasi

1st Grade - University

10 Qs

ITGS Strand Three: 3.03 & 3.04 Networks and Internet

ITGS Strand Three: 3.03 & 3.04 Networks and Internet

9th - 12th Grade

12 Qs

Mobile, Linux, and macOS Operating Systems

Mobile, Linux, and macOS Operating Systems

12th Grade - Professional Development

10 Qs

Keperluan Perisian

Keperluan Perisian

1st - 12th Grade

10 Qs

CCST Cybersecurity: Objective 3

CCST Cybersecurity: Objective 3

Assessment

Quiz

Other

12th Grade

Medium

Created by

Brian Nanns

Used 3+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which data type is protected through hard disk encryption?

Data in transit

Data in process

Data at rest

Data in use

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst discovers that a hacker was able to gain root access to an enterprise Linux server. The hacker accessed the server as a guest, used a program to bypass the root password, and then killed essential server processes as the root user. Which type of endpoint attack is this?

Brute force

Privilege escalation

DDoS

Buffer overflow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system on your network is experiencing slower than usual response times. In order to gather information about the status of the system, you issue the netstat -l command to display all of the TCP ports that are in the Listening state. What does the Listening state indicate about these ports?

The state of the connection on the ports is unknown.

The ports are actively connected to another system or process.

The remote end disconnected and the ports are closing.

The ports are open on the system and are waiting for connections.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a security technician. You just completed a full scan of a Windows 10 PC. Where should you go to view the scan result?

Windows System Logs

Windows Application Logs

Windows Task Manager

Windows Security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After an administrator installs an operating system update on a laptop, the laptop user can no longer print to their wireless printer. What should solve the issue?

Check for patches for wireless printers.

Reinstall the same service pack.

Update the firmware on the laptop.

Install a new device driver for the wireless printer.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are monitoring the syslog server and notice that the DNS server is sending messages with a Warning severity. What do these messages indicate about the operation of the DNS server?

The DNS server is unusable due to a severe malfunction and is shutting down.

An error condition is occurring that must be addressed immediately.

A condition exists that will cause errors in the future if the issue is not fixed.

The server has a hardware error that does not require immediate attention.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cybersecurity analyst is investigating an unknown executable file on a Linux computer. The analyst enters the following command in the terminal: ls -l. What is the purpose of this command?

To open a text editor

To navigate to the folder passed as an argument to the command

To display the file permissions and ownership of the executable file

To display the content of a text file

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What helps the network security team keep track of operating system versions, security updates, and patches on end-user devices?

Business continuity planning

Asset management

Security policies and procedures

Incident management