Security I - Day 3 - Review of Day 2

Security I - Day 3 - Review of Day 2

Professional Development

12 Qs

quiz-placeholder

Similar activities

SEC+ Ch.6 Review Test

SEC+ Ch.6 Review Test

Professional Development

15 Qs

Windows Updates

Windows Updates

9th Grade - Professional Development

8 Qs

Networking Basics

Networking Basics

Professional Development

10 Qs

Microsoft 365 for Teachers

Microsoft 365 for Teachers

Professional Development

10 Qs

Salesforce Admin WI22

Salesforce Admin WI22

Professional Development

17 Qs

Chapter 4: ROM/RAM

Chapter 4: ROM/RAM

9th Grade - Professional Development

15 Qs

Computing Ethics

Computing Ethics

KG - Professional Development

12 Qs

CEH Pre Assessment

CEH Pre Assessment

Professional Development

10 Qs

Security I - Day 3 - Review of Day 2

Security I - Day 3 - Review of Day 2

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

Rehan Ahmed

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the topic of the Day 2 Lecture?

Vulnerabilities and Threats

Physical Security/Virtualization and Cloud Security

Authentication/ Authorization and Access Control

Introduction to Security Terminology/Types of Attacks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What as a domain is included in Homework # 1?

Architecture and Design

Implementation

Attacks, Threats, and Vulnerabilities

Operations and Incident Response

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the topic of SkillSoft Video Training of Day 2?

Social Engineering Techniques & Attack Types

Threat Actors, Intelligence Sources, & Vulnerabilities

Authentication & Authorization Design Concepts

Security Policies, Regulations, Standards, & Frameworks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A script kiddie would most likely be involved in what type of activity?

Creating password cracking scripts to compromise networks

Developing and testing hacker tools

Vandalizing public websites

Intercepting and modifying email messages

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security goal is compromised by a DDoS attack?

Confidentiality

Integrity

Nonrepudiation

Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary risk of an integer overflow attack?

Header manipulation

Arbitrary code execution

Session hijacking

Directory traversal

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can be used to launch a coordinated DDoS attack?

Bot

Rootkit

Adware

Worm

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?