Day 4 - Security I - Day 3 Review - 1st Review

Day 4 - Security I - Day 3 Review - 1st Review

Professional Development

22 Qs

quiz-placeholder

Similar activities

CISCO M1 - Switching Concepts (Module 2)

CISCO M1 - Switching Concepts (Module 2)

Professional Development

17 Qs

Security Plus CompTIA

Security Plus CompTIA

University - Professional Development

20 Qs

Cyber Security

Cyber Security

5th Grade - Professional Development

20 Qs

Sec+ | 1.4 Encryptions | 701

Sec+ | 1.4 Encryptions | 701

Professional Development

20 Qs

MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

KG - Professional Development

20 Qs

CYBER SECURITY

CYBER SECURITY

Professional Development

18 Qs

Unit 20 _ Quiz1

Unit 20 _ Quiz1

Professional Development

20 Qs

Phishing 1

Phishing 1

Professional Development

17 Qs

Day 4 - Security I - Day 3 Review - 1st Review

Day 4 - Security I - Day 3 Review - 1st Review

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Rehan Ahmed

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the theme topic of Day 3?

Wireless Networking and Security/Mobile Device Management

Vulnerabilities and Threats

Introduction to Information Security: Network Basics and Terminology

Introduction to Security Terminology / Types of Attacks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the SkillSoft Video Training Topic of Day 3?

Social Engineering Techniques & Attack Types

Identifying Different Cyber Attacks

Implementing Secure Protocols & Application Security Solutions

Threat Actors, Intelligence Sources, & Vulnerabilities

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term describes the technique or method used to exploit a vulnerability or deliver a malware payload?

Threat vector

Threat agent

Threat category

Threat actor

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these third-party risks would most likely occur due to the use of unsecure coding practices and lack of testing?

System integration

Outsourced container development

Data storage

Supply chain activities

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which source of research would be published by the IEEE?

TTP

OSINT

RFC

Twitter

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is an advantage of on-premise database solution as opposed to a cloud service provider?

The public API calls are likely protected with digital signatures

You will often leverage a cloud access security broker

The threat actors are typically internal privileged users

Many accounts will reduce the attack surface

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What component will typically store the instances of all organizational configuration items?

SCADA

CASB

CMDB

APT

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?