
CCST Cybersecurity: Objective 3
Authored by Brian Nanns
Other
12th Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which data type is protected through hard disk encryption?
Data in transit
Data in process
Data at rest
Data in use
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security analyst discovers that a hacker was able to gain root access to an enterprise Linux server. The hacker accessed the server as a guest, used a program to bypass the root password, and then killed essential server processes as the root user. Which type of endpoint attack is this?
Brute force
Privilege escalation
DDoS
Buffer overflow
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A system on your network is experiencing slower than usual response times. In order to gather information about the status of the system, you issue the netstat -l command to display all of the TCP ports that are in the Listening state. What does the Listening state indicate about these ports?
The state of the connection on the ports is unknown.
The ports are actively connected to another system or process.
The remote end disconnected and the ports are closing.
The ports are open on the system and are waiting for connections.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a security technician. You just completed a full scan of a Windows 10 PC. Where should you go to view the scan result?
Windows System Logs
Windows Application Logs
Windows Task Manager
Windows Security
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
After an administrator installs an operating system update on a laptop, the laptop user can no longer print to their wireless printer. What should solve the issue?
Check for patches for wireless printers.
Reinstall the same service pack.
Update the firmware on the laptop.
Install a new device driver for the wireless printer.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are monitoring the syslog server and notice that the DNS server is sending messages with a Warning severity. What do these messages indicate about the operation of the DNS server?
The DNS server is unusable due to a severe malfunction and is shutting down.
An error condition is occurring that must be addressed immediately.
A condition exists that will cause errors in the future if the issue is not fixed.
The server has a hardware error that does not require immediate attention.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cybersecurity analyst is investigating an unknown executable file on a Linux computer. The analyst enters the following command in the terminal: ls -l. What is the purpose of this command?
To open a text editor
To navigate to the folder passed as an argument to the command
To display the file permissions and ownership of the executable file
To display the content of a text file
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?