Endpoint & Application Development Security (C3)
Quiz
•
Computers
•
10th - 12th Grade
•
Hard
Melody Kelley
Used 9+ times
FREE Resource
Enhance your content in a minute
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While going through the network log, Sarah, a network security administrator, noticed substantial outbound network traffic. Which activity did Sarah perform?
STIX
IOC
Telnet
HTTP
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
By definition, what is the process of reducing security exposure and tightening security controls?
Social engineering
Hardening
Passive reconnaissance
Active scanning
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following can be used to mitigate a limitation of public sharing centers in OSINT?
AIS
KRI
HTTPS
TTP
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization is planning a revamp of the existing computer hardware with new ones. The IT manager has informed department heads that some computers have faced BIOS attacks in the past. He has requested help in preventing future BIOS attacks.
As an expert, which of these solutions can you use to effectively improve boot security when the new computers are implemented in the network?
Implement BIOS supplemented with CMOS
Use computers with flash memory for booting instead of BIOS
Implement a Norton Antivirus solution
Implement measured boot with UEFI
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What additional measure should be enacted to increase the security on a computer network after secure boot, protective measures from attacks like antimalware, and intrusion detection systems are implemented in all the computers on the network?
Implement an antivirus solution in all systems and servers
Implement hardening at endpoints with patch management and operating system safeguards
Disable operating system patch updates to prevent malicious attacks
Disable connections on the Wi-Fi network
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is meant by "the chain of trust" in boot security?
Each step in the boot sequence relies on the confirmation of the hardware root of trust.
Each step in the boot sequence relies on the confirmation from the previous boot sequence step.
Each step in the boot sequence relies on the operating system logs of the previous boot sequence for boot security.
Each step in the boot sequence follows its own process independently, trusting the previous sequence step.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In which milestone should you use a network scanner and then confirm the scan manually with a room-by-room walkthrough?
Reach Your Network
Prepare to Document
Protect Your Network
Map Your Network
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
