Chapter 11. Vulnerability and Risk Assessment

Chapter 11. Vulnerability and Risk Assessment

University

30 Qs

quiz-placeholder

Similar activities

Cybersecurity Fundamentals Practice Quiz

Cybersecurity Fundamentals Practice Quiz

University

25 Qs

Module 1.1: Common Threats

Module 1.1: Common Threats

11th Grade - University

25 Qs

FIREWALL ️‍🔥

FIREWALL ️‍🔥

University

30 Qs

Mitigasi Cyber Six

Mitigasi Cyber Six

University

31 Qs

Tech Quiz Round-1 (College)

Tech Quiz Round-1 (College)

University

30 Qs

ISO27001

ISO27001

University

31 Qs

IAS Semi Final Exam

IAS Semi Final Exam

University

25 Qs

Resiliency and Site Security

Resiliency and Site Security

9th Grade - University

25 Qs

Chapter 11. Vulnerability and Risk Assessment

Chapter 11. Vulnerability and Risk Assessment

Assessment

Quiz

Computers, Professional Development

University

Hard

Used 69+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which type of vulnerability assessments software can check for weak passwords on the network?
Wireshark
Antivirus software
Performance monitor
A password cracker

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

You are contracted to conduct a forensic analysis of the computer. What should you do first?
Backu up the system
Analyze the files
Scan for viruses
Make changes to the operating system

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following has schemas written in XML?
OVAL
3DES
WPA
PAP

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Russ is using only documentation to test the security of a system. What type of testing methodology is this known as?
Active security analysis
Passive security analysis
Hybrid security analysis
Hands-on security analysis

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Of the following, which is the best way for a person to find out what security holes exist on the network?
Run a port scan
Use a network sniffer
Perform a vulnerability assessment
Use an IDS solution

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

After using Nmap to do a port scan of your server, you find that several ports are open. Which of the following should you do next?
Leave the ports open and monitor them for malicious attacks.
Run the port scan again.
Close all ports.
Examine the services and/or processes that use those ports.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is a vulnerability assessment tool?
John the Ripper
Aircrack-ng
Nessus
Cain & Abel

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers