Chapter 4 Review (Cyber)

Chapter 4 Review (Cyber)

9th - 12th Grade

16 Qs

quiz-placeholder

Similar activities

Endpoint & Application Development Security

Endpoint & Application Development Security

Cybersecurity Quiz

Cybersecurity Quiz

Found. of IT: 3.02 A Network Administrators

Found. of IT: 3.02 A Network Administrators

Cybersecurity Quiz

Cybersecurity Quiz

CY1U14.1 Test

CY1U14.1 Test

Unit 11 Topic B2 Network Components

Unit 11 Topic B2 Network Components

Chapter 4 Review (Cyber)

Chapter 4 Review (Cyber)

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Darius Washington

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An indicator that malicious activity is occurring but is still in the early stages

Indicator of compromise

key risk indicators

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Anything that could be freely used without restrictions

closed source

open source

public information sharing centers

technical exchange

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While going through the network log, Sarah, a network security administrator, noticed substantial outbound network traffic. Which activity did Sarah perform?

STIX

IOC

Telnet

HTTP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company monitors the network activity of the organization and stores the logs in a database. You have been asked to identify whether there are any malicious activities in the network. Which of the following can denote the upper and lower bounds of their various network activities?

KRI

TTP

OSI Model

Threat maps

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company has its network compromised. As an expert professional, the organization has hired you to identify the probable cause of the attack and fix it. As a security professional, you have noticed the pattern of compromise is unlike anything previously seen. You are looking to find new information on vulnerabilities like the attack that occurred.

Which of the following actions would help achieve this objective?

Checking the green web

Checking the dark web

Checking the surface web

Implementing TCP/IP protocol across the network

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which HTTP response header should be used to prevent attackers from displaying their content on a website

HSTS

CSP

X-XSS

X-Frame-Option

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An organization is planning a revamp of the existing computer hardware with new ones. The IT manager has informed department heads that some computers have faced BIOS attacks in the past. He has requested help in preventing future BIOS attacks.

implement BIOS supplemented with CMOS

Use computers with flash memory for booting instead of BIOS

Implement a Norton Antivirus solution

Implement measured boot with UEFI

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?