Security I - Day 3 - Review of Day 2

Security I - Day 3 - Review of Day 2

Professional Development

12 Qs

quiz-placeholder

Similar activities

Sec+ CH.1 Review Test

Sec+ CH.1 Review Test

Professional Development

15 Qs

Password Safety & Security

Password Safety & Security

KG - Professional Development

11 Qs

Cloud Computing_2

Cloud Computing_2

Professional Development

15 Qs

Guess the Gaming Pet 1

Guess the Gaming Pet 1

KG - Professional Development

12 Qs

Kalasag Hacker's Night Game Time

Kalasag Hacker's Night Game Time

KG - Professional Development

15 Qs

Sec+ Quiz - 2

Sec+ Quiz - 2

Professional Development

15 Qs

Day 3 C Programming quiz

Day 3 C Programming quiz

Professional Development

10 Qs

IT General Control

IT General Control

Professional Development

10 Qs

Security I - Day 3 - Review of Day 2

Security I - Day 3 - Review of Day 2

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

Rehan Ahmed

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the topic of the Day 2 Lecture?

Vulnerabilities and Threats

Physical Security/Virtualization and Cloud Security

Authentication/ Authorization and Access Control

Introduction to Security Terminology/Types of Attacks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What as a domain is included in Homework # 1?

Architecture and Design

Implementation

Attacks, Threats, and Vulnerabilities

Operations and Incident Response

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the topic of SkillSoft Video Training of Day 2?

Social Engineering Techniques & Attack Types

Threat Actors, Intelligence Sources, & Vulnerabilities

Authentication & Authorization Design Concepts

Security Policies, Regulations, Standards, & Frameworks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A script kiddie would most likely be involved in what type of activity?

Creating password cracking scripts to compromise networks

Developing and testing hacker tools

Vandalizing public websites

Intercepting and modifying email messages

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security goal is compromised by a DDoS attack?

Confidentiality

Integrity

Nonrepudiation

Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary risk of an integer overflow attack?

Header manipulation

Arbitrary code execution

Session hijacking

Directory traversal

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can be used to launch a coordinated DDoS attack?

Bot

Rootkit

Adware

Worm

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?