0 of 20 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
A security analyst suspects a network intrusion attempt is underway. Which data source would be MOST useful for capturing detailed network traffic for analysis?
Match the behavior with its corresponding description:
Behavior involves actions that are not in line with established security policies or procedures
|
|
Behavior refers to actions taken by individuals that knowingly or recklessly disregard established security policies and procedures, putting sensitive information at risk
|
|
Behavior refers to actions that occur inadvertently or accidentally, without malicious intent.
|
|
Behavior involves actions or activities that raise concerns or suspicions regarding potential security threats. Include attempting to access restricted areas or information without proper authorization,
|
|
A server log analysis reveals failed login attempts with usernames not associated with any authorized users. This is a potential indicator of which type of attack?
Which of the following would determine if safeguards that have been installed were properly implemented, performing as expected and producing the appropriate results? Match the safeguard with the description:
Determines if safeguards that have been installed were properly implemented, performing as expected and producing the appropriate results
|
|
Critical for attack surface management, determines as many vulnerabilities as possible within defined time and scope parameters
|
|
Adopts current threat intelligence methodologies and tactics to identify, expose and correct vulnerabilities
|
|
A reward for finding security flaws (bugs) in an application
|
|
Refers to hardening areas that are potential entry points, including cloud infrastructure.
|
|
Arrange the following activities performed in the risk response process in order of priority:
View Answers:
Match the log with its corresponding description:
Help security analysts identify unauthorized access attempts, suspicious network behavior, and potential threats such as port scanning or denial-of-service (DoS) attack
|
|
Capture events and activities generated by software applications running on servers or client devices
|
|
contain information about user logins, file access, system processes, and network connections initiated by endpoint devices
|
|
include authentication events, system configuration changes, audit trails, and security policy enforcement activities.
|
|
Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?
Which of the following considerations are critical for comparing and contrasting the security implications of different architectures?
Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?
A {agreement} outlines mutual goals and general terms of an understanding.
A outlines mutual goals and general terms of an understanding.
A ________ is also known as a trusted execution environment or TEE.
A is also known as a trusted execution environment or TEE.
When troubleshooting a firewall configuration, a technician determines a “deny any” policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable. Which of the following actions would prevent this issue?
A {contract} usually specifies more concrete terms, responsibilities, and roles of each party in a business relationship.
A usually specifies more concrete terms, responsibilities, and roles of each party in a business relationship.
Match the attack with its corresponding description:
a combination of Internet Protocol (IP) spoofing and the saturation of a network with Internet Control Message Protocol (ICMP) messages
|
|
occurs when a hacker tries all possible values for such variables as usernames and passwords.
|
|
occurs when a hacker intercepts messages from a sender, modifies those messages, and sends them to a legitimate receiver.
|
|
occurs when an attacker exploits the three-packet Transmission Control Protocol (TCP) handshake
|
|
Order the phases of an incident response:
View Answers:
Which type of security control focuses on day-to-day activities and procedures that users and administrators perform to maintain security?
Match the audit type with its description:
Refer to a comprehensive category of assessments that encompasses a broad range of evaluations and can include various types of evaluations conducted by external parties encompassing financial audits, security audits, compliance audits, or other examinations aimed at evaluating different aspects of organizational performance, governance, or risk management
|
|
Involve evaluating adherence to laws, regulations, or industry standards set forth by governing bodies or regulatory agencies: assess compliance with requirements related to data protection, privacy, financial reporting, or industry-specific regulations
|
|
Refers to the process of evaluating systems, processes, or controls to identify strengths, weaknesses, and areas for improvement
|
|
Specifically target adherence to applicable laws, regulations, or industry standards. These audits assess whether the organization’s policies, procedures, and practices align with regulatory requirements and whether it has implemented adequate controls to mitigate compliance risks
|
|
Order these root cause analysis steps in order or priority:
View Answers: