PCCSA Practice Questions
63 real PCCSA exam questions with expert-verified answers and explanations. Page 2 of 2.
- Question #51Cyberthreat, Cyberattack, and Cybersecurity Awareness
You discover malware has corrupted the BIOS on your laptop. Which type of malware is this?
Malware typesBootkitBIOS infectionFirmware malware - Question #52Network Security Fundamentals
Which type of firewall monitors traffic streams from beginning to end?
FirewallStateful firewallNetwork securityTraffic monitoring - Question #53Network Security Fundamentals
Which option lists the correct sequence of a TCP three-way handshake?
TCPThree-way handshakeNetwork protocolsNetwork communication - Question #54Fundamentals of Cloud Security
Which two types of SaaS applications are allowed by an IT department? (Choose two.)
SaaS managementCloud application governanceSanctioned SaaSTolerated SaaS - Question #55Network Security Fundamentals
Which network method securely connects two sites across a public network?
VPNNetwork SecuritySite-to-Site ConnectivityPublic Network Security - Question #56Network Security Fundamentals
A Zero Trust network security model is based on which security principle?
Zero TrustLeast PrivilegeNetwork Security ModelsSecurity Principles - Question #57Cyberthreat, Cyberattack, and Cybersecurity Awareness
Which option is an important characteristic or capability of advanced malware?
Advanced MalwareMalware CharacteristicsEvasion TechniquesFile-less Malware - Question #58Cyberthreat, Cyberattack, and Cybersecurity Awareness
Review the exhibit and identify the type of vulnerability or attack that is commonly used against this technology.
password crackingauthentication attackscyberattack typescredential theft - Question #59Network Security Fundamentals
When accessing an intranet website, a certificate error is received. What can be done to move past the certificate error and ensure that the error is not received the next time the...
SSL/TLS CertificatesCertificate TrustWeb Browser SecurityHTTPS - Question #60Fundamentals of Cloud Security
Assume that it is your responsibility to secure the software functioning at all layers in the exhibit. Which cloud service model type is represented?
Cloud Service ModelsOn-premisesShared Responsibility Model - Question #61Cybersecurity Landscape
Which security principle describes the practice of giving users the minimum rights to access the resources necessary to do their jobs?
least privilegeaccess controlsecurity principlesuser rights management - Question #62Cyberthreat, Cyberattack, and Cybersecurity Awareness
An attacker emails a malicious URL links to 50,000 email addresses. The email states that users can click the link to view the latest celebrity news, but the link also secretly inf...
PhishingEmail attacksSocial engineering - Question #63Cyberthreat, Cyberattack, and Cybersecurity Awareness
Which step of the cyber-attack lifecycle is a user's web browser redirected to a webpage that automatically downloads malware to the endpoint?
Cyber-attack lifecycleMalware deliveryWeb attacksEndpoint security