Endpoint & Application Development Security (C3)

Endpoint & Application Development Security (C3)

10th - 12th Grade

22 Qs

quiz-placeholder

Similar activities

Chapter 4 Review (Cyber)

Chapter 4 Review (Cyber)

UEFI Quiz

UEFI Quiz

Sec+ - 10A - Implement Endpoint Security

Sec+ - 10A - Implement Endpoint Security

Final Review

Final Review

Endpoint & Application Development Security (C3)

Endpoint & Application Development Security (C3)

Assessment

Quiz

Computers

10th - 12th Grade

Hard

Created by

Melody Kelley

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While going through the network log, Sarah, a network security administrator, noticed substantial outbound network traffic. Which activity did Sarah perform?

STIX

IOC

Telnet

HTTP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By definition, what is the process of reducing security exposure and tightening security controls?

Social engineering

Hardening

Passive reconnaissance

Active scanning

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can be used to mitigate a limitation of public sharing centers in OSINT?

AIS

KRI

HTTPS

TTP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is planning a revamp of the existing computer hardware with new ones. The IT manager has informed department heads that some computers have faced BIOS attacks in the past. He has requested help in preventing future BIOS attacks.


As an expert, which of these solutions can you use to effectively improve boot security when the new computers are implemented in the network?

Implement BIOS supplemented with CMOS

Use computers with flash memory for booting instead of BIOS

Implement a Norton Antivirus solution

Implement measured boot with UEFI

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What additional measure should be enacted to increase the security on a computer network after secure boot, protective measures from attacks like antimalware, and intrusion detection systems are implemented in all the computers on the network?

Implement an antivirus solution in all systems and servers

Implement hardening at endpoints with patch management and operating system safeguards

Disable operating system patch updates to prevent malicious attacks

Disable connections on the Wi-Fi network

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by "the chain of trust" in boot security?

Each step in the boot sequence relies on the confirmation of the hardware root of trust.

Each step in the boot sequence relies on the confirmation from the previous boot sequence step.

Each step in the boot sequence relies on the operating system logs of the previous boot sequence for boot security.

Each step in the boot sequence follows its own process independently, trusting the previous sequence step.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which milestone should you use a network scanner and then confirm the scan manually with a room-by-room walkthrough?

Reach Your Network

Prepare to Document

Protect Your Network

Map Your Network

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers