Security I - Day 3 - Review of Day 2

Security I - Day 3 - Review of Day 2

Professional Development

12 Qs

quiz-placeholder

Similar activities

SOF Day 1 Review

SOF Day 1 Review

Professional Development

12 Qs

FinTech 21-3 Advanced Solidity

FinTech 21-3 Advanced Solidity

Professional Development

7 Qs

Physical Security Controls

Physical Security Controls

Professional Development

10 Qs

Cybersecurity Concepts

Cybersecurity Concepts

Professional Development

10 Qs

Operation Reliability

Operation Reliability

Professional Development

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

OWASP Top 10

OWASP Top 10

Professional Development

10 Qs

AWS Shield

AWS Shield

Professional Development

11 Qs

Security I - Day 3 - Review of Day 2

Security I - Day 3 - Review of Day 2

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Rehan Ahmed

Used 2+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the topic of the Day 2 Lecture?

Vulnerabilities and Threats

Physical Security/Virtualization and Cloud Security

Authentication/ Authorization and Access Control

Introduction to Security Terminology/Types of Attacks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What as a domain is included in Homework # 1?

Architecture and Design

Implementation

Attacks, Threats, and Vulnerabilities

Operations and Incident Response

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the topic of SkillSoft Video Training of Day 2?

Social Engineering Techniques & Attack Types

Threat Actors, Intelligence Sources, & Vulnerabilities

Authentication & Authorization Design Concepts

Security Policies, Regulations, Standards, & Frameworks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A script kiddie would most likely be involved in what type of activity?

Creating password cracking scripts to compromise networks

Developing and testing hacker tools

Vandalizing public websites

Intercepting and modifying email messages

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security goal is compromised by a DDoS attack?

Confidentiality

Integrity

Nonrepudiation

Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary risk of an integer overflow attack?

Header manipulation

Arbitrary code execution

Session hijacking

Directory traversal

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can be used to launch a coordinated DDoS attack?

Bot

Rootkit

Adware

Worm

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?