
CYSA + (251-300)
Authored by cysa cysa
Computers
KG
Used 37+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
48 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the order of priority for risk mitigation from highest to lowest?
(ExamTopic'e gore guncellendi)
A. A, B, C, D
B. A, D, B, C
C. B, C, A, D
D. C, B, D, A
E. D, A, C, B
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.252 A security analyst for a large financial institution is creating a threat model for a specific threat actor that is likely targeting an organization's financial assets. Which of the following is the BEST example of the level of sophistication this threat actor is using?
A. Social media accounts attributed to the threat actor
B. Custom malware attributed to the threat actor from prior attacks
C. Email addresses and phone numbers tied to the threat actor
D. Network assets used in previous attacks attributed to the threat actor
E. IP addresses used by the threat actor for command and control
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.253 A security analyst is investigating malicious traffic from an internal system that attempted to download proxy avoidance software as identified from the firewall logs but the destination IP is blocked and not captured. Which of the following should the analyst do?
A. Shut down the computer
B. Capture live data using Wireshark
C. Take a snapshot
D. Determine if DNS logging is enabled.
E. Review the network logs.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.254 An organization has the following policies: Services must run on standard ports. Unneeded services must be disabled. The organization has the following servers: 192.168.10.1 - web server 192.168.10.2 - database server A security analyst runs a scan on the servers and sees the following output:
A. Disable HTTPS on 192.168.10.1
B. Disable IIS on 192.168.10.1
C. Disable DNS on 192.168.10.2
D. Disable MSSQL on 192.168.10.2
E. Disable SSH on both servers
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.255 A security analyst has a sample of malicious software and needs to know what the sample does? The analyst runs the sample in a carefully controlled and monitored virtual machine to observe the software behavior. Which of the following malware analysis approaches is this?
A. White box testing
B. Fuzzing
C. Sandboxing
D. Static code analysis
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.256 A Chief Executive Officer (CEO) is concerned about the company's intellectual property being leaked to competitors. The security team performed an extensive review but did not find any indication of an outside breach. The data sets are currently encrypted using the Triple Data Encryption Algorithm. Which of the following courses of action is appropriate?
A. Limit all access to the sensitive data based on geographic access requirements with strict rolebased access controls
B. Enable data masking and reencrypt the data sets using AES-256.
C. Ensure the data is correctly classified and labeled, and that DLP rules are appropriate to prevent disclosure.
D. Use data tokenization on sensitive fields, reencrypt the data sets using AES-256, and then create an MD5 hash
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.257 An information security analyst is working with a data owner to identify the appropriate controls to preserve the confidentiality of data within an enterprise environment One of the primary concerns is exfiltration of data by malicious insiders Which of the following controls is the MOST appropriate to mitigate risks?
A. Data deduplication
B. OS fingerprinting
C. Digital watermarking
D. Data loss prevention
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
50 questions
KISIKISIPAS9
Quiz
•
3rd Grade
48 questions
Sprawdzian z systemow sieciowych i podstawowych komend Linux
Quiz
•
2nd - 3rd Grade
44 questions
Technology: Final exam review
Quiz
•
7th - 8th Grade
44 questions
Data Organization in Windows 10
Quiz
•
3rd Grade
50 questions
CSS11_4TH_QTR_EXAM
Quiz
•
11th Grade
47 questions
Easy Quiz
Quiz
•
KG
50 questions
ULANGAN SUMATIF BAB I INFORMATIKA
Quiz
•
10th Grade
52 questions
ÔN TẬP KIỂM TRA HK 1 ĐỊA LÍ 10
Quiz
•
10th Grade
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for Computers
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Place Value
Quiz
•
KG - 3rd Grade
15 questions
Grammar
Quiz
•
KG - 7th Grade
10 questions
Sound Energy Assessment
Quiz
•
KG - 2nd Grade
10 questions
Sound Energy
Quiz
•
KG - 2nd Grade
10 questions
Counting Dimes and Pennies
Quiz
•
KG - 2nd Grade
10 questions
Dr. Seuss
Quiz
•
KG - 5th Grade
10 questions
Place Value: Hundreds, Tens, and Ones
Quiz
•
KG - 2nd Grade