CySA Module 6 - Software and Hardware Assurance Best Practices

CySA Module 6 - Software and Hardware Assurance Best Practices

9th Grade

15 Qs

quiz-placeholder

Similar activities

Typing

Typing

3rd Grade - University

15 Qs

Programming - Intro to HTML

Programming - Intro to HTML

9th Grade - University

15 Qs

File Management, Operating Systems and More

File Management, Operating Systems and More

9th - 12th Grade

18 Qs

Understanding Computer Hardware Concepts

Understanding Computer Hardware Concepts

9th - 12th Grade

20 Qs

Module 3 - Unity Scripting Basics

Module 3 - Unity Scripting Basics

9th - 12th Grade

15 Qs

Data Literacy Quizizz

Data Literacy Quizizz

6th Grade - University

15 Qs

CodeHS Cybersecurity-and-You-Quiz

CodeHS Cybersecurity-and-You-Quiz

9th - 12th Grade

15 Qs

Exploring Data for Insights

Exploring Data for Insights

9th Grade - University

20 Qs

CySA Module 6 - Software and Hardware Assurance Best Practices

CySA Module 6 - Software and Hardware Assurance Best Practices

Assessment

Quiz

Information Technology (IT)

9th Grade

Hard

Created by

Jose Manuel Rios

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Thierry wants to implement a method of analyzing network traffic to detect attacks by using a database of known attacks for comparison. Which of the following methods of analysis meets his goal?

Signature analysis

Behavioral analysis

Availability analysis

Anomaly analysis

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security researcher has just been sent a set of files from zero-day malware for analysis. The researcher is concerned about damage to hardware, as the hardware budget for the current fiscal year has been exhausted. Which of the following should the security researcher implement?

Trusted foundry

Fingerprinting

Decomposition

Sandboxing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security engineer has been brought onto a project for a new system containing several critical files that should never change. However, the team needs to be able to know if a file does change. Which of the following solutions would the security engineer most likely recommend?

Fingerprinting

White box

Sandboxing

Scoping

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A systems administrator works for the U.S. Department of Defense (DoD). She is building out infrastructure to host a new application. Which of the following might she need to reference before ordering any of the hardware to ensure that the hardware and vendor are approved?

OEM documentation

Trusted foundry

Qualitative risk database

Vendor framework

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jared has created a field in the database that acts as the back end for an application he has written. The field has been configured to store an 8-bit unsigned number. The field where the user enters information has only been configured to accept numbers, but Jared apparently forgot to add logic to ensure that the user could not enter numbers greater than 255. Which of the following could occur as a result of this oversight?

Data overflow

Data truncation

Data corruption

Data loss

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jaden has received an alert from a system that has identified potential malware on itself. Upon looking through the log files, he sees a list of error messages where an executable tried to write data to a range of memory addresses that did not exist for the system. Which of the following has most likely occurred?

Space overflow

Decimal overflow

Integer overflow

Buffer overflow

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Amadeus is composing a new web application that his organization will make available to the general public. The site will offer users the ability to sign up for accounts and interact with certain functions of the application. Which of the following should he ensure is done as part of the sign-up process?

Input validation

Fuzzing

Static code analysis

Automated reporting

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?