ECHA Review Day 3

ECHA Review Day 3

10th - 12th Grade

48 Qs

quiz-placeholder

Similar activities

SecurityFundamentalsVocabReviewDay1

SecurityFundamentalsVocabReviewDay1

Access Control Vocab

Access Control Vocab

MTA Security Fundamental Day 3

MTA Security Fundamental Day 3

Access Control InClass Rvw

Access Control InClass Rvw

MTA Security Fund 5

MTA Security Fund 5

EOC review Day 1

EOC review Day 1

Cyber 1 Module 1 Review

Cyber 1 Module 1 Review

ECHA Review 2

ECHA Review 2

ECHA Review Day 3

ECHA Review Day 3

Assessment

Quiz

Computers

10th - 12th Grade

Medium

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

48 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Darius and Mathew were performing internal vulnerability scan within the corporate network and reported the results to his manager.Manager found that it was not performed correctly because there were some mismatches on comparing both of them. He was expecting the same results, as both the scans were performed at the same time, using the same tools and the same IP ranges. The results simply showed more findings in Darius' scan compared to Mathew's scan.What was the most probably root cause?

Administrator of the scanned system updated most of the vulnerabilities
One of the scan was blocked by IPS
One of the scan was blocked by IDS
Mathew's scan was blocked by Firewall

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During an Xmas scan, what indicates a port is closed?

RST
SYN
ACK
No return response

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An attacker is trying to redirect the traffic of a small office. That office is using their own mail server, DNS server and NTP server because of the importance of their jobs. The attacker gains access to the DNS server and redirects the direction www.google.com to his own IP address. Now, when the employees of the office want to go to Google, they are being redirected to the attacker's machine. What is the name of this kind of attack?

DNS Spoofing
ARP Poisoning
Smurf Attack
MAC Flooding

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of analysis is performed when an attacker has partial knowledge of the inner-workings of the application?

Announced
White-box
Black-box
Grey-box

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An enterprise recently moved to a new office, and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours. What is the best option to do this job?

Use an IDS in the entrance doors and install some of them near the corners
Install a CCTV with cameras pointing to the entrance doors and the street
Use lights in all the entrance doors and along the company's perimeter
Use fences in the entrance doors

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which method of password cracking takes the most time and effort?

Dictionary attack
Brute force
Rainbow tables
Shoulder surfing

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Refers to the number of incorrect logon attempts permitted before a system locks an account. Each bad logon attempt is tracked by the bad logon counter

account lockout
Credential Guard
polymorphic virus
removable device

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?