
Chapter 4 Review (Cyber)
Authored by Darius Washington
Computers
9th - 12th Grade
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An indicator that malicious activity is occurring but is still in the early stages
Indicator of compromise
key risk indicators
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Anything that could be freely used without restrictions
closed source
open source
public information sharing centers
technical exchange
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While going through the network log, Sarah, a network security administrator, noticed substantial outbound network traffic. Which activity did Sarah perform?
STIX
IOC
Telnet
HTTP
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company monitors the network activity of the organization and stores the logs in a database. You have been asked to identify whether there are any malicious activities in the network. Which of the following can denote the upper and lower bounds of their various network activities?
KRI
TTP
OSI Model
Threat maps
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company has its network compromised. As an expert professional, the organization has hired you to identify the probable cause of the attack and fix it. As a security professional, you have noticed the pattern of compromise is unlike anything previously seen. You are looking to find new information on vulnerabilities like the attack that occurred.
Which of the following actions would help achieve this objective?
Checking the green web
Checking the dark web
Checking the surface web
Implementing TCP/IP protocol across the network
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which HTTP response header should be used to prevent attackers from displaying their content on a website
HSTS
CSP
X-XSS
X-Frame-Option
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
An organization is planning a revamp of the existing computer hardware with new ones. The IT manager has informed department heads that some computers have faced BIOS attacks in the past. He has requested help in preventing future BIOS attacks.
implement BIOS supplemented with CMOS
Use computers with flash memory for booting instead of BIOS
Implement a Norton Antivirus solution
Implement measured boot with UEFI
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
16 questions
Conditions
Quiz
•
8th - 10th Grade
15 questions
Q1 W1 M1 PRE-TEST
Quiz
•
10th Grade
20 questions
Database&Relation
Quiz
•
12th Grade
20 questions
Data structure test1
Quiz
•
12th Grade
11 questions
Creative iMedia: Strengths, Weaknesses and Improvements
Quiz
•
10th Grade
20 questions
Latihan Soal Administrasi Infrastruktur Jaringan XII TKJ
Quiz
•
10th - 12th Grade
20 questions
Ulangan Harian - Jaringan Komputer & Analisis Data
Quiz
•
10th Grade
16 questions
Input Device
Quiz
•
9th - 10th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade