The CSA+ quiz assesses knowledge in cybersecurity, focusing on attack detection, system security, and preventive measures. It tests skills like traffic analysis, duties separation, log management, and secure access, crucial for IT security professionals.
Mandatory Vacation
Personnel screening
Training and certification
Separation of duties
Rate this question:
Log aggregation and analysis
Software assurance
Encryption
Acceptable use policies
Password complexity
Network isolation and separation
Rate this question:
Prohibit password reuse writing a GPO
Deploy multifactor authentication
Require awareness training
Implement DLP solution
Rate this question:
Honeypot
Jump Box
Server hardening
Anti-malware
Rate this question:
OSSIM
SDLC
SANS
ISO
Rate this question:
VLANs
OS
Trained operators
Physical access restrictions
Processing power
Hard drive capacity
Rate this question:
The company email server is running a non-standard port
The company email server has been compromised
The company is running a vulnerable SSH server
The company web server has been comprised
Rate this question:
Activate the escalation checklist
Implement the incident response plan
Analyze the forensic image
Preform evidence acquisition
Rate this question:
Operation systems
Running services
Installed software
Installed hardware
Rate this question:
The policy should describe the roles and responsibilities between users and managers, and the management of specific data types
The policy should establish the protocol for retaining information types based on regulatory or business needs
The policy should document practices that users must adhere to in order to access data on the corporate network or internet
The policy should outline the organizations administration of accounts for authorized to access the appropriate date
Rate this question:
Remove and replace the managed switch with a unmanaged one
Implement a separate logical network segment for management interfaces
Install and configure NAC servers to allow only authorized devices to connect to the network
Analyze normal behaviors on the network and configure IDS to alert on deviations from normal
Rate this question:
The company should contact the upstream ISP and ask that RFC 1918 traffic be dropped
The company should implement a network-based sinkhole to drop all traffic coming from 192.168.1.1 at their gateway router
The company should implement the following ACL at their gateway firewall: Deny IP HOST 192.168.1.1 170.43.30.0/24
The company should enable the Dos resource starvation protection feature of the gateway NIPS
Rate this question:
(CVSS Score)* Difficulty =Priority Where difficulty is a range from 0.1 to 1.0 with 1.0 being the easiest and lowest risk to implement
(CVSS Score)* Difficulty =Priority Where difficulty is a range from 1 to 5 with 1 being the easiest and lowest risk to implement
(CVSS Score)* Difficulty =Priority Where difficulty is a range from 1 to 10 with 10 being the easiest and lowest risk to implement
(CVSS Score)*2)/Difficulty =Priority Where difficulty is a range from 1 to 5 with 5 being the easiest and lowest risk to implement
Rate this question:
OWASP
SANS
PHP
Ajax
Rate this question:
APT
DDos
Zero day
False positive
Rate this question:
Implement input validation on the server
Install patches on the server
Disable all unneeded services running on the server
Run wireshark to determine what is accessing the server
Rate this question:
The analyst is the red team The employee is the blue team The manager is the white team
The analyst is the white team The employee is the red team The manager is the blue team
The analyst is the red team The employee is the white team The manager is the blue team
The analyst is the blue team The employee is the red team The manager is the white team
Rate this question:
Social media profiling
Email harvesting
Packet capture
Service discovery
DNS harvesting
Rate this question:
Hashing utility
Write blockers
Fuzzer
Password cracker
Rate this question:
Code encryption
XSS attack
Parameter validation
Character blacklist
Malicious code execution
SQL injection
Rate this question:
PACP
SCAP
IPS
SIEM
Rate this question:
Impersonation
Privilege escalation
Directory traversal
Input injection
Rate this question:
Make a copy of the hard drive
Use write blockers
Run rm -r command to create a hash
Install it on a different machine and explore the content
Rate this question:
Cross-site request forgery
SQL injection
Cross-site scripting
Session Hijacking
Rate this question:
Follow the incident response plan for the introduction of new accounts
Disable the user accounts
Remove the accounts access privileges to sensitive information
Monitor the outbound traffic from the application for signs of data exfiltration
Confirm the accounts are valid and ensure role-bases permission are appropriate
Rate this question:
Incident Response Plan
Lesson learned report
Reverse engineering process
Chain of custody documentation
None of the above
Rate this question:
Threat intelligence
Threat information
Threat data
Advanced persistent threat
Rate this question:
Remediate both DEV and STG concurrently, test and then remediate PROD
Remediate DEV and test , remediate STG and test and the remediate PROD
Remediate PROD first, skipping DEV and STG and test
Remediate only STG and test, and the remediate PROD
Rate this question:
To schedule personnel resources for test activates
To determine frequency of team communication and reporting
To mitigation unintended impacts to operation
To avoid conflicts with real intrusions that may occur
To ensure test have measure impact to operations
Rate this question:
The vulnerability scanner should be configured to preform authenticated scans
The vulnerability scanner should be installed on a web server
The vulnerability scanner should implement OS and network service detection
The vulnerability scanner should scan for know and unknown vulnrbilities
Rate this question:
Trend analysis
Behavior analysis
Availability analysis
Business analysis
Rate this question:
A FTP was explicitly allowed in seq 8 of the ACL
FTP was allowed in seq 10 of ACL
FTO was allowed as being included in seq and 4 of the ACL
FTP was allowed as being outbound from seq 9 of the ACL
Rate this question:
Install agents on the endpoints to preform the scan
Provide each endpoint with the vulnerability scanner credentials
Encrypt all traffic between the scanner and the endpoint
Deploy scanners with the administrator privileges on each end point
Rate this question:
Invest in and implement a solution to ensure non-repudiation
Force a daily password change
Send an email asking users not to share their credentials
Run a report on all users sharing their credentials and alert their management of further actions
Rate this question:
Root cause analysis of the incident and the impact it had on the organization
Outline of the detailed reverse engineering step for management to review
Performance data from the impacted sever and endpoints to report management
Enhancements to the policies and practice that will improve business responses
Lists of IP addresses, applications and assets
Rate this question:
This is normal network traffic
123.120.110.212 is infected with a Trojan
172.29.0.109 is infected with a work
172.29.0.109 is infected with a Trojan
VPN
Honeypot
Whitelisting
DMZ
MAC filtering
Rate this question:
Fuzzing
Regression testing
Stress testing
Input validation
Rate this question:
POS malware
Rootkit
Key logger
Ransomware
Rate this question:
Attackers are running reconnaissance on company resources
Commands are attempting to reach a system infected with a botnet trojan
An insider is trying to exfiltrate information to a remote network
Malware is running on a company system
Rate this question:
Phishing
OS fingerprinting
Keylogging
Social engineering
Rate this question:
The communication should be limited to trusted parties only
The communication should be limited to security staff only
The communication should come from law enforcement
The communication should be limited to management only
Rate this question:
Manual peer review
User acceptance testing
Input validation
Stress test the application
Rate this question:
Honeypot
Location-based NAC
System isolation
Mandatory access control
Bastion host
Rate this question:
Reserved MACs
Host IPs
DNS routing tables
Gateway settings
Rate this question:
Web application firewall
Network firewall
Web proxy
Intrusion prevention system
Rate this question:
The remote host is redirection port 80 to port 8080
The remote host is running a service on port 8080
The remote host's firewall is dropping packets for port 80
The remote host is running a webserver on port 80
Rate this question:
Prevent users from accessing email and file-sharing via web proxy
Prevent flash drives from connection to USB ports using Group Policy
Prevent users from copying data from workstation to workstation
Prevent internet access on laptops unless connected to the network in the office or via VPN
Prevent users from bein able to use the copy and paste functions
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.