Questions for the PCCSA were updated on : Feb 15 ,2025
DRAG DROP
Match each set of terms to their associated security layer.
Select and Place:
You discover malware has corrupted the BIOS on your laptop. Which type of malware is this?
A
What are two methods to securely transmit personally identifiable information? (Choose two.)
C D
Which type of cloud computing deployment is available to any person or organization who can pay the usage fees?
A
Which two reconnaissance tools might an attacker use to scan for vulnerable network services and settings? (Choose two.)
C D
What is the result of deploying virtualization in your data center?
B
When a company chooses to deploy a branch location with antivirus software, which risk model are they using to manage
risk?
A
An attacker emails a malicious URL link to 50,000 email addresses. The email states that users can click the link to view the
latest celebrity news, but the link also secretly infects the users laptop. This scenario describes which type of attack?
B
Which option describes a characteristic of a next-generation firewall but not a UTM device?
B
What is a component of a public key infrastructure?
D
DRAG DROP
Match the common TCP/IP protocol with its corresponding port(s).
Select and Place:
You discover an infected email attachment that contains software code that attacks a known vulnerability in a popular social
networking application. This type of software code belongs to which type of malware category?
D
Which well-known port is associated with the Simple Mail Transfer Protocol?
B
Which data security compliance standard is used to protect credit cardholder data wherever it is processed, stored, or
transmitted?
B
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?
C