The CSA+ quiz assesses knowledge in cybersecurity, focusing on attack detection, system security, and preventive measures. It tests skills like traffic analysis, duties separation, log management, and secure access, crucial for IT security professionals.
Privilege escalation
Advanced persistent threat
Malicious insider threat
Spear phishing
Rate this question:
OWASP
SANS
PHP
Ajax
Rate this question:
Zero-day attack
Known malware attack
Sessions hijack
Cookie stealing
Rate this question:
OWASP
SANS
PHP
Ajax
Rate this question:
Dd
Wget
Touch
Rm
Rate this question:
Honeypot
Jump Box
Server hardening
Anti-malware
Rate this question:
Timing of the scan
Contents of the executive summary report
Excluded hosts
Maintenance windows
IPS configuration
Incident response policies
Rate this question:
Anti-malware application
Host-based IDS
TPM data sealing
File integrity monitoring
Rate this question:
OSSIM
SDLC
SANS
ISO
Rate this question:
The security analyst should recommend this device to be placed behind a WAF
The security analyst should recommend and IDS placed on the network segment
The security analyst should recommend this device regularly export the web logs to a SIEM system
The security analyst should recommend this device be included in regular vulnerability scans
Rate this question:
Anti-malware application
Host-based IDS
TPM data sealing
File intergrity monitoring
Rate this question:
VPN
Honeypot
Whitelisting
DMZ
MAC filtering
Rate this question:
A cipher that is known to be cryptographically weak
A website using a self-signed SSL certificate
A buffer overflow that allows remote code execution
An HTTP response that reveals an internal address
Rate this question:
Static analysis
Virtualization
Sandboxing
Fuzz testing
Rate this question:
Set "Alowlatescanning" to 1 in the URLScan.ini configuration file
Set "Removeserverheader" to 1 in the URLScan.ini configuration file
Set "Enablelogging" to 0 in the URLScan.ini configuration file
Set Perprocesslogging" to 1 in the URLScan.ini configuration file
Rate this question:
Self -service password reset
Single sign-on
Context-based authentication
Password complexity
Rate this question:
Web application firewall
Network firewall
Web proxy
Intrusion prevention system
Rate this question:
Continue monitoring critical systems
Shut down all server interfaces
Inform management of the incident
Inform user regarding the affected systems
Rate this question:
PII of company employees and customers was exfiltrated
Raw financial information about the company was accessed
Forensic review of the server required fall-back on a less efficient service
IP addresses and other network-related configurations was exfiltrated
The local root password for the affected server was compromised
Rate this question:
The company email server is running a non-standard port
The company email server has been compromised
The company is running a vulnerable SSH server
The company web server has been comprised
Rate this question:
Hashing utility
Write blockers
Fuzzer
Password cracker
Rate this question:
The cloud provider
The data owner
The cybersecurity analyst
The system administrator
Rate this question:
Start the change control process
Rescan to ensure the vulnerability still exists
Implement continuous monitoring
Begin the incident response process
Rate this question:
The analyst is not using the standard approved browser
The analyst accidentally clicked related to the indicator
The analyst has prefetch enabled on the browser in use
The alert is unrelated to the analyst's search
Rate this question:
The ownership pf/ usr has been changed to the current user
Administrative functions have been locked from users
Administrative commanders have been made world readable/writable
The ownership of/usr has been changed to the root user
Rate this question:
Operation systems
Running services
Installed software
Installed hardware
Rate this question:
Trend analysis
Behavior analysis
Availability analysis
Business analysis
Rate this question:
CVSS
SLA
ITIL
OpenVAS
Qualys
Rate this question:
Syslog
Network mapping
Firewall logs
NIDS
Rate this question:
A manual log review from data sent to syslog
An OS fingerprinting scan across all hosts
A packet capture of data traversing the server network
A service discovery scan on the network
Rate this question:
Red team
Blue team
Systems administrators
Security analysts
Operations team
Rate this question:
Utilizing an operating system SCAP plugin
Utilizing an authorized credential scan
Utilizing an non-credential scan
Utilizing a known malware plugin
Rate this question:
Packet of death
Zero-day malware
PII exfiltration
Known virus
Rate this question:
Mandatory Vacation
Personnel screening
Training and certification
Separation of duties
Rate this question:
Remove and replace the managed switch with a unmanaged one
Implement a separate logical network segment for management interfaces
Install and configure NAC servers to allow only authorized devices to connect to the network
Analyze normal behaviors on the network and configure IDS to alert on deviations from normal
Rate this question:
Reserved MACs
Host IPs
DNS routing tables
Gateway settings
Rate this question:
Schedule
Authorization
List of system administrators
Payment terms
Business justification
Rate this question:
Kali
Splunk
Syslog
OSSM
Rate this question:
Cross-site scripting
Header manipulation
SQL injection
XML injection
Rate this question:
Succession planning
Separation of duties
Mandatory vacation
Personnel training
Job rotation
Rate this question:
Sever consolidation
Load balancing hypervisors
Fast server provisioning
Running multiple OS instances
Rate this question:
Acceptable use policy
Service level agreement
Rules of engagement
Memorandum of understanding
Master service agreement
Rate this question:
Correct the audit. This finding is a well-known positive; the services that typically run on 389 and 636 are identical
Change all devices and servers that support it to 636; as encrypted services run by default on 636
Change all devices and servers that support It to 636, as 389 is a reserved port that requires root access and can expose the server to privilege escalation attacks
Correct the audit. This finding is accurate, but the correct remediation is to update keys on each of the servers to match port 636
Rate this question:
POS malware
Rootkit
Key logger
Ransomware
Rate this question:
Fuzzing
User acceptance testing
Regression testing
Penetration testing
Rate this question:
Follow the incident response plan for the introduction of new accounts
Disable the user accounts
Remove the accounts access privileges to sensitive information
Monitor the outbound traffic from the application for signs of data exfiltration
Confirm the accounts are valid and ensure role-bases permission are appropriate
Rate this question:
Fuzzing
Regression testing
Stress testing
Input validation
Rate this question:
Syslog
Network mapping
Firewall logs
NIDS
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.