Computer Lab for Rent
Meeting Room Rental
Training Facility Rental
Exam Testing Center
Purchase Exam Vouchers
Custom Course Development
Who We Are
Work With Us
Take this free CySA+ quiz to get your IT career started!:
Step 1 of 11
Which type of attack is NOT used for password cracking?
An administrator notices that several web applications are being exploited by means of XSS attacks. Which security control should have been implemented to help avoid these attacks from taking place?
John is experiencing some issues on his network. He suspects there is a failing node somewhere that is causing the problem. Which of the following signs can he consider to help him locate the failure?
After deploying an application to the production network, Tim receives alerts from the IDS saying there is abnormal traffic behavior. What should Tim do next?
Remove suspected application
Investigate the end-point of the traffic patterns to determine owner
Remove connection to the Internet
Run an emergency update on all clients
What would an administrator use to determine what services and nodes are on the network?
Anne, the technician, has determined that the data on a disk drive is no longer needed. What is the MOST effective way for the media to be discarded if security is her main concern?
What is the FIRST thing Jim, the administrator, should do when notified that a user within the organization is viewing prohibited material on his workstation?
Escort the employee in question to a conference room and request that another supervisor ensure that no one accesses the workstation while upper management is notified of the incident
Browse the contents of the employee's workstation using File Explorer
Log in to the workstation and change the employee's password
Call the local police department
What is the most effective tool for determining the attack surface of a network?
Intrusion Detection System
Which step would NOT be taken when hardening a system?
Blocking unused ports/services
The "evil twin" attack is typically geared toward what type of victims?
Remote Access Clients
Confirm Your Email to See Your Score!