
Endpoint & Application Development Security (C3)
Authored by Melody Kelley
Computers
10th - 12th Grade
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While going through the network log, Sarah, a network security administrator, noticed substantial outbound network traffic. Which activity did Sarah perform?
STIX
IOC
Telnet
HTTP
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
By definition, what is the process of reducing security exposure and tightening security controls?
Social engineering
Hardening
Passive reconnaissance
Active scanning
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following can be used to mitigate a limitation of public sharing centers in OSINT?
AIS
KRI
HTTPS
TTP
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization is planning a revamp of the existing computer hardware with new ones. The IT manager has informed department heads that some computers have faced BIOS attacks in the past. He has requested help in preventing future BIOS attacks.
As an expert, which of these solutions can you use to effectively improve boot security when the new computers are implemented in the network?
Implement BIOS supplemented with CMOS
Use computers with flash memory for booting instead of BIOS
Implement a Norton Antivirus solution
Implement measured boot with UEFI
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What additional measure should be enacted to increase the security on a computer network after secure boot, protective measures from attacks like antimalware, and intrusion detection systems are implemented in all the computers on the network?
Implement an antivirus solution in all systems and servers
Implement hardening at endpoints with patch management and operating system safeguards
Disable operating system patch updates to prevent malicious attacks
Disable connections on the Wi-Fi network
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is meant by "the chain of trust" in boot security?
Each step in the boot sequence relies on the confirmation of the hardware root of trust.
Each step in the boot sequence relies on the confirmation from the previous boot sequence step.
Each step in the boot sequence relies on the operating system logs of the previous boot sequence for boot security.
Each step in the boot sequence follows its own process independently, trusting the previous sequence step.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In which milestone should you use a network scanner and then confirm the scan manually with a room-by-room walkthrough?
Reach Your Network
Prepare to Document
Protect Your Network
Map Your Network
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
17 questions
Data Structures: 1D,2D & List
Quiz
•
11th Grade
25 questions
HTML
Quiz
•
11th Grade
20 questions
Q1 M3 PRE-TEST
Quiz
•
10th Grade
20 questions
Quiz ASJ
Quiz
•
12th Grade
20 questions
Quiz
•
7th - 12th Grade
20 questions
CSS Acronyms
Quiz
•
9th - 10th Grade
21 questions
Lecture Exercise Topic 1.3
Quiz
•
12th Grade
20 questions
Software
Quiz
•
10th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade