
uC 003 Malicious Activity
Quiz
•
Computers
•
University
•
Hard

Jose Manuel Rios
FREE Resource
Enhance your content
48 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Nick wants to analyze a potentially malicious software package using an open-source, locally hosted tool. Which of the following tools is best suited to his need if he wants to run the tool as part of the process?
Cuckoo Sandbox
SIEM
EDR
VirusTotal
Answer explanation
Automated malware analysis with Cuckoo Sandbox
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cynthia wants to build scripts to detect malware beaconing behavior. Which of the following is not a means of identifying malware beaconing behavior for building scripts on a network?
Beaconing interval
Removal of known traffic
Beacon protocol
Persistence of the beaconing
Answer explanation
A beacon protocol is not a means of identifying malware beaconing behavior for building scripts on a network. Unless Cynthia already knows the protocol that a particular beacon uses, filtering out beacons by protocol may cause her to miss beaconing behavior. Attackers want to dodge common analytical tools and will use protocols that are less likely to attract attention.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Henry wants to identify potentially unauthorized scheduled tasks on a Linux system. What Linux command is most useful to identify scheduled tasks?
cron
chmod
ps
ls
Answer explanation
The cron command is used to set, view, and maintain scheduled tasks in Linux. Scheduled tasks, or cron jobs in Linux, are also a popular method for attackers to maintain persistent access to systems. Checking for unexpected scheduled tasks (or cron jobs) is a common part of incident response processes.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Angela wants to search for rogue devices on her network. Which of the following techniques will best help her identify systems if she has a complete hardware and systems inventory?
Traffic analysis for unexpected behavior
MAC address verification
MAC address vendor checking
Site surveys
Answer explanation
Since Angela already knows the media access control (MAC) addresses of all the devices due to her systems inventory, she can simply search for associated MAC addresses that do not match the list.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ian wants to provide additional email security for his organization. Which of the following is not used to enhance email security?
DKIM
DMARC
S/PDIF
SPF
Answer explanation
Automated malware analysis with Cuckoo Sandbox
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a common network issue?
Beaconing
Bandwidth consumption
Unexpected traffic
Link aggregation
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Brian works in an XYZ organization. His network suddenly stops working at 8:40 AM, interrupting video conferences, streaming, and other services throughout his organization, and then resumes functioning. When Brian logs into his Paessler Router Traffic Grapher (PRTG) console and checks his router's traffic via the primary connection's redundant network link, he sees the following graph. What should Brian presume occurred based on the given information shown in Figure A?
The network has failed and is running in cached mode.
PRTG stopped receiving flow information and needs to be restarted.
The primary link had gone down and he should check the secondary link for traffic.
There was a link card failure and the card has recovered.
Answer explanation
PRTG
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
45 questions
Networking and Wireless Communication Quiz
Quiz
•
University
51 questions
US TKJ
Quiz
•
University
50 questions
Computer Networking 1 Prelim Exam
Quiz
•
University
45 questions
Data Communications Reviewer for UT1
Quiz
•
University
50 questions
Quiz Latihan Soal-Soal UTS Keamanan Jaringan
Quiz
•
KG - University
46 questions
98-366 Lesson 3 Wired and Wireless Networks
Quiz
•
10th Grade - University
50 questions
CCNP Route
Quiz
•
University
50 questions
Data-Link Layer
Quiz
•
University
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
Discover more resources for Computers
11 questions
NFL Football logos
Quiz
•
KG - Professional Dev...
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)
Quiz
•
8th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms
Quiz
•
11th Grade - University
38 questions
Unit 6 Key Terms
Quiz
•
11th Grade - University
20 questions
La Hora
Quiz
•
9th Grade - University
7 questions
Cell Transport
Interactive video
•
11th Grade - University
7 questions
What Is Narrative Writing?
Interactive video
•
4th Grade - University