
Chapter 4 Review (Cyber)
Quiz
•
Computers
•
9th - 12th Grade
•
Medium
Darius Washington
Used 11+ times
FREE Resource
Enhance your content in a minute
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An indicator that malicious activity is occurring but is still in the early stages
Indicator of compromise
key risk indicators
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Anything that could be freely used without restrictions
closed source
open source
public information sharing centers
technical exchange
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While going through the network log, Sarah, a network security administrator, noticed substantial outbound network traffic. Which activity did Sarah perform?
STIX
IOC
Telnet
HTTP
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company monitors the network activity of the organization and stores the logs in a database. You have been asked to identify whether there are any malicious activities in the network. Which of the following can denote the upper and lower bounds of their various network activities?
KRI
TTP
OSI Model
Threat maps
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company has its network compromised. As an expert professional, the organization has hired you to identify the probable cause of the attack and fix it. As a security professional, you have noticed the pattern of compromise is unlike anything previously seen. You are looking to find new information on vulnerabilities like the attack that occurred.
Which of the following actions would help achieve this objective?
Checking the green web
Checking the dark web
Checking the surface web
Implementing TCP/IP protocol across the network
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which HTTP response header should be used to prevent attackers from displaying their content on a website
HSTS
CSP
X-XSS
X-Frame-Option
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
An organization is planning a revamp of the existing computer hardware with new ones. The IT manager has informed department heads that some computers have faced BIOS attacks in the past. He has requested help in preventing future BIOS attacks.
implement BIOS supplemented with CMOS
Use computers with flash memory for booting instead of BIOS
Implement a Norton Antivirus solution
Implement measured boot with UEFI
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
