CySA Module 5 - Infrastructure Controls

CySA Module 5 - Infrastructure Controls

9th Grade

14 Qs

quiz-placeholder

Similar activities

Introduction to Cybersecurity Quiz

Introduction to Cybersecurity Quiz

9th Grade - University

15 Qs

Web Applications Quiz

Web Applications Quiz

9th Grade

15 Qs

Components of a URL Quiz

Components of a URL Quiz

9th Grade

16 Qs

Asessmen Diagnostik  Jaringan Komputer dan Internet

Asessmen Diagnostik Jaringan Komputer dan Internet

9th - 12th Grade

15 Qs

CySA Module 10 - Responding to a Cyber Incident

CySA Module 10 - Responding to a Cyber Incident

9th Grade

15 Qs

Recap Handout 3 & 4

Recap Handout 3 & 4

6th Grade - University

15 Qs

KEAMANAN DATA

KEAMANAN DATA

9th - 12th Grade

15 Qs

Jaringan Komputer

Jaringan Komputer

9th Grade

10 Qs

CySA Module 5 - Infrastructure Controls

CySA Module 5 - Infrastructure Controls

Assessment

Quiz

Information Technology (IT)

9th Grade

Hard

Created by

Jose Manuel Rios

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Peter has just been hired as a network engineer and has recently been examining the company's core router configuration. He notices that the current configuration would allow an incoming packet from the Internet to have a source IP address within the 10.0.0.0/8, 172.16.0.0/12, or 192.168.0.0/16 address space. Which of the following should Peter do?

Create a rule on the switches that connect to the router to discard any traffic with those addresses in the source IP field.

Modify the ACL on the router to prevent the traffic from transferring to the internal network from the Internet for those addresses.

Replace the router with a stateless firewall.

Nothing. The router configuration is correct.

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

A solutions architect has designed a new web-based application that will be hosted on a cloud service provider. The web server will be publicly accessible, and the database server it uses will be located in a private subnet that is only accessible from the subnet where the public-facing web server is located. The database server will not be accessible directly from the Internet. Which of the following might the solutions architect implement in order to manage and maintain the database server?

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security engineer has found that an industrial control system used in one of his company's manufacturing plants has a vulnerability that could halt production in the entire plant if exploited. The ICS doesn't need to be accessible from the Internet—it should only be accessed from the control room located within the same building. Which of the following could be implemented as the most effective way to prevent this system from being discovered and exploited?

Next-generation firewall

Proxy server

Air gapping

Secure admin workstation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system administrator is looking for solutions to distract any intruders that make it past the company's perimeter protections. This would give the security team more time to respond. Which of the following might the system administrator choose to deploy to meet this goal?

NIDS

ACLs

Honeynet

VLAN

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system administrator has just been hired at a company that has been experiencing rapid growth in its second year of operation. When the company began, users simply were given permissions for the files or directories to which they needed access by the owners of the files and directories. Which of the following should the system administrator recommend to accommodate this new growth?

RBAC

DAC

TACACS

NAC

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is trying to log into a system and receives the error message below. Which of the following types of access control is the organization most likely using? Error: You are not allowed to access this resource. Your access: Confidential. Required: Secret. All attempts to access this resource are logged. Please contact the administrator if you believe this message to be in error.

DAC

RuBAC

ABAC

MAC

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms describes the technology that the security administrator has implemented?

Sinkhole

Honeypot

NIDS

NIPS

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?