1) Olivia is considering potential sources for threat intelligence information that she might incorporate into her security program. Which one of the following sources is most likely to be available without a subscription fee? a) Vulnerability feeds b) Open source c) Closed source d) Proprietary 2) Roger is evaluating threat intelligence information sources and finds that one source results in quite a few false positive alerts. This lowers his confidence level in the source. What criteria for intelligence is not being met by this source? a) Timeliness b) Expense c) Relevance d) Accuracy 3) Brad is working on a threat classification exercise, analyzing known threats and assessing the possibility of unknown threats. Which one of the following threat actors is most likely to be associated with an advanced persistent threat (APT)? a) Hacktivist b) Nation-state c) Insider d) Organized crime 4) What term is used to describe the groups of related organizations that pool resources to share cybersecurity threat information and analyses? a) SOC b) ISAC c) CERT d) CIRT 5) Singh incorporated the Cisco Talos tool into his organization's threat intelligence program. He uses it to automatically look up information about the past activity of IP addresses sending email to his mail servers. What term best describes this intelligence source? a) Open source b) Behavioral c) Reputational d) Indicator of compromise 6) Jamal is assessing the risk to his organization from their planned use of AWS Lambda, a serverless computing service that allows developers to write code and execute functions directly on the cloud platform. What cloud tier best describes this service? a) SaaS b) PaaS c) IaaS d) FaaS 7) Lauren's honeynet, shown here, is configured to use a segment of unused network space that has no legitimate servers in it. This design is particularly useful for detecting what types of threats? c01uf001.png a) Zero-day attacks b) SQL injection c) Network scans d) DDoS attacks 8) Fred believes that the malware he is tracking uses a fast flux DNS network, which associates many IP addresses with a single fully qualified domain name as well as using multiple download hosts. How many distinct hosts should he review based on the NetFlow shown here? chrome_c0bOtfCQcv 1 a) 3 b) 4 c) 5 9) Which one of the following functions is not a common recipient of threat intelligence information? a) Legal counsel b) Risk management c) Security engineering d) Detection and monitoring 10) Alfonzo is an IT professional at a Portuguese university who is creating a cloud environment for use only by other Portuguese universities. What type of cloud deployment model is he using? a) Public cloud b) Private cloud c) Hybrid cloud d) Community cloud 11) As a member of a blue team, Lukas observed the following behavior during an external penetration test. What should he report to his managers at the conclusion of the test? c01uf002.png a) A significant increase in latency. b) A significant increase in packet loss. c) Latency and packet loss both increased. d) No significant issues were observed. 12) The company that Maria works for is making significant investments in infrastructure-as-a-service hosting to replace its traditional datacenter. Members of her organization's management have Maria's concerns about data remanence when Lauren's team moves from one virtual host to another in their cloud service provider's environment. What should she instruct her team to do to avoid this concern? a) Zero-wipe drives before moving systems. b) Use full-disk encryption. c) Use data masking. d) Span multiple virtual disks to fragment data. 13) Geoff is reviewing logs and sees a large number of attempts to authenticate to his VPN server using many different username and password combinations. The same usernames are attempted several hundred times before moving on to the next one. What type of attack is most likely taking place? a) Credential stuffing b) Password spraying c) Brute-force d) Rainbow table 14) Kaiden is configuring a SIEM service in his IaaS cloud environment that will receive all of the log entries generated by other devices in that environment. Which one of the following risks is greatest with this approach in the event of a DoS attack or other outage? a) Inability to access logs b) Insufficient logging c) Insufficient monitoring d) Insecure API 15) Azra believes that one of her users may be taking malicious action on the systems she has access to. When she walks past the user's desktop, she sees the following command on the screen: What is the user attempting to do? chrome_ZBLxuoUXH6 a) They are attempting to hash a file. b) They are attempting to crack hashed passwords. c) They are attempting to crack encrypted passwords. d) They are attempting a pass-the-hash attack. 16) Lucas believes that an attacker has successfully compromised his web server. Using the following output of ps, identify the process ID he should focus on: chrome_mgtULDpFBD a) 508 b) 617 c) 846 d) 714 17) Geoff is responsible for hardening systems on his network and discovers that a number of network appliances have exposed services, including telnet, FTP, and web servers. What is his best option to secure these systems? a) Enable host firewalls. b) Install patches for those services. c) Turn off the services for each appliance. d) Place a network firewall between the devices and the rest of the network. 18) While conducting reconnaissance of his own organization, Ian discovers that multiple certificates are self-signed. What issue should he report to his management? a) Self-signed certificates do not provide secure encryption for site visitors. b) Self-signed certificates can be revoked only by the original creator. c) Self-signed certificates will cause warnings or error messages. d) None of the above. 19) Brandon wants to perform a WHOIS query for a system he believes is located in Europe. Which NIC should he select to have the greatest likelihood of success for his query? a) AFRINIC b) APNIC c) RIPE d) LACNIC 20) While reviewing Apache logs, Janet sees the following entries as well as hundreds of others from the same source IP address. What should Janet report has occurred? chrome_BCR8RBnjPr a) A denial-of-service attack b) A vulnerability scan c) A port scan d) A directory traversal attack 21) Scott is part of the white team that is overseeing his organization's internal red and blue teams during an exercise that requires each team to only perform actions appropriate to the penetration test phase they are in. During the reconnaissance phase, he notes the following behavior as part of a Wireshark capture. What should he report? c01uf003.png a) The blue team has succeeded. b) The red team is violating the rules of engagement. c) The red team has succeeded. d) The blue team is violating the rules of engagement. 22) Jennifer analyzes a Wireshark packet capture from a network that she is unfamiliar with. She discovers that a host with IP address 10.11.140.13 is running services on TCP ports 636 and 443. What services is that system most likely running? a) LDAPS and HTTPS b) FTPS and HTTPS c) RDP and HTTPS d) HTTP and Secure DNS 23) While tracking a potential APT on her network, Cynthia discovers a network flow for her company's central file server. What does this flow entry most likely show if 10.2.2.3 is not a system on her network chrome_gqizJAE1lp.png a) A web browsing session b) Data exfiltration c) Data infiltration d) A vulnerability scan 24) During a regularly scheduled PCI compliance scan, Fred has discovered port 3389 open on one of the point-of-sale terminals that he is responsible for managing. What service should he expect to find enabled on the system? a) MySQL b) RDP c) TOR d) Jabber 25) Saanvi knows that the organization she is scanning runs services on alternate ports to attempt to reduce scans of default ports. As part of her intelligence-gathering process, she discovers services running on ports 8080 and 8443. What services are most likely running on these ports? a) Botnet C&C b) Nginx c) Microsoft SQL Server instances d) Web servers 26) Kwame is reviewing his team's work as part of a reconnaissance effort and is checking Wireshark packet captures. His team reported no open ports on 10.0.2.15. What issue should he identify with their scan based on the capture shown here? c01uf004.png a) The host was not up. b) Not all ports were scanned. c) The scan scanned only UDP ports. d) The scan was not run as root. 27) Angela wants to gather network traffic from systems on her network. What tool can she use to best achieve this goal? a) Nmap b) Wireshark c) Sharkbait d) Dradis 28) Wang submits a suspected malware file to malwr.com and receives the following information about its behavior. What type of tool is malwr.com? c01uf005.png a) A reverse-engineering tool b) A static analysis sandbox c) A dynamic analysis sandbox d) A decompiler sandbox 29) Which sources are most commonly used to gather information about technologies a target organization uses during intelligence gathering? a) OSINT searches of support forums and social engineering b) Port scanning and social engineering c) Social media review and document metadata d) Social engineering and document metadata 30) Sarah has been asked to assess the technical impact of suspected reconnaissance performed against her organization. She is informed that a reliable source has discovered that a third party has been performing reconnaissance by querying WHOIS data. How should Sarah categorize the technical impact of this type of reconnaissance? a) High. b) Medium. c) Low. d) She cannot determine this from the information given. 31) Rick is reviewing flows of a system on his network and discovers the following flow logs. What is the system doing? chrome_Y5ucWJJN9C.png a) A port scan b) A failed three-way handshake c) A ping sweep d) A traceroute 32) Ryan's passive reconnaissance efforts resulted in the following packet capture. Which of the following statements cannot be verified based on the packet capture shown for the host with IP address 10.0.2.4? c01uf005a.png a) The host does not have a DNS entry. b) It is running a service on port 139. c) It is running a service on port 445. d) It is a Windows system. 33) Kevin is concerned that an employee of his organization might fall victim to a phishing attack and wants to redesign his social engineering awareness program. What type of threat is he most directly addressing? a) Nation-state b) Hacktivist c) Unintentional insider d) Intentional insider 34) What purpose does a honeypot system serve when placed on a network as shown in the following diagram? c01uf006.png a) It prevents attackers from targeting production servers. b) It provides information about the techniques attackers are using. c) It slows down attackers like sticky honey. d) It provides real-time input to IDSs and IPSs. 35) A tarpit, or a system that looks vulnerable but actually is intended to slow down attackers, is an example of what type of technique? a) A passive defense b) A sticky defense c) An active defense d) A reaction-based defense 36) Susan needs to test thousands of submitted binaries. She needs to ensure that the applications do not contain malicious code. What technique is best suited to this need? a) Sandboxing b) Implementing a honeypot c) Decompiling and analyzing the application code d) Fagan testing 37) Manesh downloads a new security tool and checks its MD5. What does she know about the software she downloaded if she receives the following message? chrome_fkkitH6t3X.png a) The file has been corrupted. b) Attackers have modified the file. c) The files do not match. d) The test failed and provided no answer. 38) Aziz needs to provide SSH access to systems behind his datacenter firewall. If Aziz's organization uses the system architecture shown here, what is the system at point A called? c01uf007.png a) A firewall-hopper b) An isolated system c) A moat-protected host d) A jump box 39) During his analysis of a malware sample, Sahib reviews the malware files and binaries without running them. What type of analysis is this? a) Automated analysis b) Dynamic analysis c) Static analysis d) Heuristic analysis 40) Carol wants to analyze a malware sample that she has discovered. She wants to run the sample safely while capturing information about its behavior and impact on the system it infects. What type of tool should she use? a) A static code analysis tool b) A dynamic analysis sandbox tool c) A Fagan sandbox d) A decompiler running on an isolated VM 41) Susan is reviewing files on a Windows workstation and believes that cmd.exe has been replaced with a malware package. Which of the following is the best way to validate her theory? a) Submit cmd.exe to VirusTotal. b) Compare the hash of cmd.exe to a known good version. c) Check the file using the National Software Reference Library. d) Run cmd.exe to make sure its behavior is normal. 42) Nishi is deploying a new application that will process sensitive health information about her organization's clients. To protect this information, the organization is building a new network that does not share any hardware or logical access credentials with the organization's existing network. What approach is Nishi adopting? a) Network interconnection b) Network segmentation c) Virtual LAN (VLAN) isolation d) Virtual private network (VPN) 43) Bobbi is deploying a single system that will be used to manage a sensitive industrial control process. This system will operate in a stand-alone fashion and not have any connection to other networks. What strategy is Bobbi deploying to protect this SCADA system? a) Network segmentation b) VLAN isolation c) Airgapping d) Logical isolation 44) Geoff has been asked to identify a technical solution that will reduce the risk of captured or stolen passwords being used to allow access to his organization's systems. Which of the following technologies should he recommend? a) Captive portals b) Multifactor authentication c) VPNs d) OAuth 45) The company that Amanda works for is making significant investments in infrastructure-as-a-service hosting to replace their traditional datacenter. Members of her organization's management have expressed concerns about data remanence when Amanda's team moves from one virtual host to another in their cloud service provider's environment. What should she instruct her team to do to avoid this concern? a) Perform zero-wipe drives before moving systems. b) Use full-disk encryption. c) Use data masking. d) Span multiple virtual disks to fragment data. 46) Which one of the following technologies is not typically used to implement network segmentation? a) Host firewall b) Network firewall c) VLAN tagging d) Routers and switches 47) Ian has been asked to deploy a secure wireless network in parallel with a public wireless network inside his organization's buildings. What type of segmentation should he implement to do so without adding additional costs and complexity? a) SSID segmentation b) Logical segmentation c) Physical segmentation d) WPA segmentation 48) Barbara has segmented her virtualized servers using VMware to ensure that the networks remain secure and isolated. What type of attack could defeat her security design? a) VLAN hopping b) 802.1q trunking vulnerabilities c) Compromise of the underlying VMware host d) BGP route spoofing 49) What major issue would Charles face if he relied on hashing malware packages to identify malware packages? a) Hashing can be spoofed. b) Collisions can result in false positives. c) Hashing cannot identify unknown malware. d) Hashing relies on unencrypted malware samples. 50) Noriko wants to ensure that attackers cannot access his organization's building automation control network. Which of the following segmentation options provides the strongest level of assurance that this will not happen? a) Air gap b) VLANs c) Network firewalls d) Host firewalls 51) Angela is a security practitioner at a midsize company that recently experienced a serious breach due to a successful phishing attack. The company has committed to changing its security practices across the organization and has assigned Angela to determine the best strategy to make major changes that will have a significant impact right away. Angela's company has relied on passwords as its authentication factor for years. The current organizational standard is to require an eight-character, complex password and to require a password change every 12 months. What recommendation should Angela make to significantly decrease the likelihood of a similar phishing attack and breach in the future? a) Increase the password length. b) Shorten the password lifespan. c) Deploy multifactor authentication. d) Add a PIN to all logins. 52) Angela is a security practitioner at a midsize company that recently experienced a serious breach due to a successful phishing attack. The company has committed to changing its security practices across the organization and has assigned Angela to determine the best strategy to make major changes that will have a significant impact right away.Angela has decided to roll out a multifactor authentication system. What are the two most common factors used in MFA systems? a) Location and knowledge b) Knowledge and possession c) Knowledge and biometric d) Knowledge and location 53) Angela is a security practitioner at a midsize company that recently experienced a serious breach due to a successful phishing attack. The company has committed to changing its security practices across the organization and has assigned Angela to determine the best strategy to make major changes that will have a significant impact right away.Angela's multifactor deployment includes the ability to use text (SMS) messages to send the second factor for authentication. What issues should she point to? a) VoIP hacks and SIM swapping. b) SMS messages are logged on the recipient's phones. c) PIN hacks and SIM swapping. d) VoIP hacks and PIN hacks. 54) What purpose does the OpenFlow protocol serve in software-defined networks? a) It captures flow logs from devices. b) It allows software-defined network controllers to push changes to devices to manage the network. c) It sends flow logs to flow controllers. d) It allows devices to push changes to SDN controllers to manage the network. 55) Rick's security research company wants to gather data about current attacks and sets up a number of intentionally vulnerable systems that allow his team to log and analyze exploits and attack tools. What type of environment has Rick set up? a) A tarpit b) A honeypot c) A honeynet d) A blackhole 56) Kalea wants to prevent DoS attacks against her serverless application from driving up her costs when using a cloud service. What technique is <i>not</i> an appropriate solution for her need? a) Horizontal scaling b) API keys c) Setting a cap on API invocations for a given timeframe d) Using timeouts 57) What is the key difference between virtualization and containerization? a) Virtualization gives operating systems direct access to the hardware, whereas containerization does not allow applications to directly access the hardware. b) Virtualization lets you run multiple operating systems on a single physical system, whereas containerization lets you run multiple applications on the same system. c) Virtualization is necessary for containerization, but containerization is not necessary for virtualization. d) There is not a key difference; they are elements of the same technology. 58) Brandon is designing the hosting environment for containerized applications. Application group A has personally identifiable information, application group B has health information with different legal requirements for handling, and application group C has business-sensitive data handling requirements. What is the most secure design for his container orchestration environment given the information he has? a) Run a single, highly secured container host with encryption for data at rest. b) Run a container host for each application group and secure them based on the data they contain. c) Run a container host for groups A and B, and run a lower-security container host for group C. d) Run a container host for groups A and C, and run a health information–specific container host for group B due to the health information it contains. 59) Local and domain administrator accounts, root accounts, and service accounts are all examples of what type of account? a) Monitored accounts b) Privileged accounts c) Root accounts d) Unprivileged accounts 60) Ned has discovered a key logger plugged into one of his workstations, and he believes that an attacker may have acquired usernames and passwords for all of the users of a shared workstation. Since he does not know how long the keylogger was in use or if it was used on multiple workstations, what is his best security option to prevent this and similar attacks from causing issues in the future? a) Multifactor authentication b) Password complexity rules c) Password lifespan rules d) Prevent the use of USB devices 61) Facebook Connect, CAS, Shibboleth, and AD FS are all examples of what type of technology? a) Kerberos implementations b) Single sign-on implementations c) Federation technologies d) OAuth providers 62) Which of the following is not a common identity protocol for federation? a) SAML b) OpenID c) OAuth d) Kerberos 63) Naomi wants to enforce her organization's security policies on cloud service users. What technology is best suited to this? a) OAuth b) CASB c) OpenID d) DMARC 64) Elliott wants to encrypt data sent between his servers. What protocol is most commonly used for secure web communications over a network? a) TLS b) SSL c) IPsec d) PPTP 65) What occurs when a website's certificate expires? a) Web browsers will report an expired certificate to users. b) The website will no longer be accessible. c) The certificate will be revoked. d) All of the above. 66) What term is used to describe defenses that obfuscate the attack surface of an organization by deploying decoys and attractive targets to slow down or distract an attacker? a) An active defense b) A honeyjar c) A bear trap d) An interactive defense 67) What technology is most commonly used to protect data in transit for modern web applications? a) VPN b) TLS c) SSL d) IPsec 68) Anja is assessing the security of a web service implementation. Which of the following web service security requirements should she recommend to reduce the likelihood of a successful on-path/man-in-the-middle attack? a) Use TLS. b) Use XML input validation. c) Use XML output validation. d) Virus-scan files received by web service. 69) What type of access is typically required to compromise a physically isolated and air-gapped system? a) Wired network access b) Physical access c) Wireless network access d) None of the above, because an isolated, air-gapped system cannot be accessed 70) Amanda's organization uses an air-gap design to protect the HSM device that stores its root encryption certificate. How will Amanda need to access the device if she wants to generate a new certificate? c01uf008.png a) Wirelessly from her laptop b) Over the wired network from her PC c) From a system on the air-gapped network d) Amanda cannot access the device without physical access to it 71) Which of the following parties directly communicate with the end user during a SAML transaction? a) The relying party b) The SAML identity provider c) Both the relying party and the identity provider d) Neither the relying party nor the identity provider 72) Support for AES, 3DES, ECC, and SHA-256 are all examples of what? a) Encryption algorithms b) Hashing algorithms c) Processor security extensions d) Bus encryption modules 73) Which of the following is <i>not</i> a benefit of physical segmentation? a) Easier visibility into traffic b) Improved network security c) Reduced cost d) Increased performance 74) Which of the following options is most effective in preventing known password attacks against a web application? a) Account lockouts b) Password complexity settings c) CAPTCHAs d) Multifactor authentication 75) Which of the following is not a common use case for network segmentation? a) Creating a VoIP network b) Creating a shared network c) Creating a guest wireless network d) Creating trust zones 76) What three layers make up a software-defined network? a) Application, Datagram, and Physical layers b) Application, Control, and Infrastructure layers c) Control, Infrastructure, and Session layers d) Data link, Presentation, and Transport layers 77) Micah is designing a containerized application security environment and wants to ensure that the container images he is deploying do not introduce security issues due to vulnerable applications. What can he integrate into the CI/CD pipeline to help prevent this? a) Automated checking of application hashes against known good versions b) Automated vulnerability scanning c) Automated fuzz testing d) Automated updates 78) Camille wants to integrate with a federation. What will she need to authenticate her users to the federation? a) An IDP b) A SP c) An API gateway d) An SSO server 79) Brandon needs to deploy containers with different purposes, data sensitivity levels, and threat postures to his container environment. How should he group them? a) Segment containers by purpose b) Segment containers by data sensitivity c) Segment containers by threat model d) All of the above 80) What issues should Brandon consider before choosing to use the vulnerability management tools he has in his non-container-based security environment? a) Vulnerability management tools may make assumptions about host durability. b) Vulnerability management tools may make assumptions about update mechanisms and frequencies. c) Both A and B. d) Neither A nor B. 81) What key functionality do enterprise privileged account management tools provide? a) Password creation b) Access control to individual systems c) Entitlement management across multiple systems d) Account expiration tools 82) Amira wants to deploy an open standard–based single sign-on (SSO) tool that supports both authentication and authorization. What open standard should she look for if she wants to federate with a broad variety of identity providers and service providers? a) LDAP b) SAML c) OAuth d) OpenID Connect 83) Adam is testing code written for a client-server application that handles financial information and notes that traffic is sent between the client and server via TCP port 80. What should he check next? a) If the server stores data in unencrypted form b) If the traffic is unencrypted c) If the systems are on the same network d) If usernames and passwords are sent as part of the traffic 84) Faraj wants to use statistics gained from live analysis of his network to programmatically change its performance, routing, and optimization. Which of the following technologies is best suited to his needs? a) Serverless b) Software-defined networking c) Physical networking d) Virtual private networks (VPNs) 85) Elaine's team has deployed an application to a cloud-hosted serverless environment. Which of the following security tools can she use in that environment? a) Endpoint antivirus b) Endpoint DLP c) IDS for the serverless environment d) None of the above 86) Lucca needs to explain the benefits of network segmentation to the leadership of his organization. Which of the following is <i>not</i> a common benefit of segmentation? a) Decreasing the attack surface b) Increasing the number of systems in a network segment c) Limiting the scope of regulatory compliance efforts d) Increasing availability in the case of an issue or attack 87) Kubernetes and Docker are examples of what type of technology? a) Encryption b) Software-defined networking c) Containerization d) Serverless 88) Nathan is designing the logging infrastructure for his company and wants to ensure that a compromise of a system will not result in the loss of that system's logs. What should he do to protect the logs? a) Limit log access to administrators. b) Encrypt the logs. c) Rename the log files from their common name. d) Send the logs to a remote server. 89) Ansel knows he wants to use federated identities in a project he is working on. Which of the following should not be among his choices for a federated identity protocol? a) OpenID b) SAML c) OAuth d) Authman 90) James uploads a file that he believes is potentially a malware package to VirusTotal and receives positive results, but the file is identified with multiple different malware package names. What has most likely occurred? a) The malware is polymorphic and is being identified as multiple viruses because it is changing. b) Different antimalware engines call the same malware package by different names. c) VirusTotal has likely misidentified the malware package, and this is a false positive. d) The malware contains multiple malware packages, resulting in the matches. 91) Isaac wants to monitor live memory usage on a Windows system. What tool should he use to see memory usage in a graphical user interface? a) MemCheck b) Performance Monitor c) WinMem d) Top 92) Abul wants to identify typical behavior on a Windows system using a built-in tool to understand memory, CPU, and disk utilization. What tool can he use to see both real-time performance and over a period of time? a) sysmon b) sysgraph c) resmon d) resgraph 93) The automated malware analysis tool that Jose is using uses a disassembler and performs binary diffing across multiple malware binaries. What information is the tool looking for? a) Calculating minimum viable signature length b) Binary fingerprinting to identify the malware author c) Building a similarity graph of similar functions across binaries d) Heuristic code analysis of development techniques 94) What does execution of wmic.exe, powershell.exe, or winrm.vbs most likely indicate if you discover one or more was run on a typical end user's workstation? a) A scripted application installation b) Remote execution of code c) A scripted application uninstallation d) A zero-day attack 95) Ben is reviewing network traffic logs and notices HTTP and HTTPS traffic originating from a workstation. What TCP ports should he expect to see this traffic sent to under most normal circumstances? a) 80 and 443 b) 22 and 80 c) 80 and 8088 d) 22 and 443 96) While Lucy is monitoring the SIEM, she notices that all of the log sources from her organization's New York branch have stopped reporting for the past 24 hours. What type of detection rules or alerts should she configure to make sure she is aware of this sooner next time? a) Heuristic b) Behavior c) Availability d) Anomaly 97) After her discovery in the previous question, Lucy is tasked with configuring alerts that are sent to system administrators. She builds a rule that can be represented in pseudocode as follows: Send an SMS alert every 30 seconds when systems do not send logs for more than 1 minute. The average administrator at Lucy's organization is responsible for 150–300 machines. What danger does Lucy's alert create? a) A DDoS that causes administrators to not be able to access systems b) A network outage c) Administrators may ignore or filter the alerts d) A memory spike 98) Lucy configures an alert that detects when users who do not typically travel log in from other countries. What type of analysis is this? a) Trend b) Availability c) Heuristic d) Behavior 99) Disabling unneeded services is an example of what type of activity? a) Threat modeling b) Incident remediation c) Proactive risk assessment d) Reducing the threat attack surface area 100) Suki notices inbound traffic to a Windows system on TCP port 3389 on her corporate network. What type of traffic is she most likely seeing? a) A NetBIOS file share b) A RADIUS connection c) An RDP connection d) A Kerberos connection
0%
CySA+ Chapter 1a
Share
Share
Share
by
Elakithelion
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Quiz
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?