Search Header Logo

Cyber Quiz

Authored by Dove Soap

Computers

Professional Development

Used 10+ times

Cyber Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a sandbox interprocess communication service?

A collection of host services that allow for communication between sandboxes

A collection of interfaces that allow for coordination of activities among processes

A collection of network services that are activated on an interface, allowing for inter-port communication.

A collection of rules within the sandbox that prevent the communication between sandboxes

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What causes events on a Windows system to show Event Code 4625 in the log messages?

Someone is trying a brute force attack on the network

Another device is gaining root access to the system

The system detected an XSS attack

A privileged user successfully logged into the system

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which type of data consists of connection level, application-specific records generated from network traffic?

statistical data

alert data

location data

transaction data

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How is NetFlow different from traffic mirroring?

NetFlow generates more data than traffic mirroring

NetFlow collects metadata and traffic mirroring clones data

Traffic mirroring costs less to operate than NetFlow

Traffic mirroring impacts switch performance and NetFlow does no

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An analyst discovers that a legitimate security alert has been dismissed.Which signature caused this impact on the network traffic?

true negative

true positive

false negative

false positive

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in thenetwork?

 

Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies

Tapping interrogation replicates signals to a separate port for analyzing traffic

Inline interrogation detects malicious traffic but does not block the traffic

Tapping interrogations detect and block malicious traffic

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which signature impacts network traffic by causing legitimate traffic to be blocked?

true negative

false negative

false positive

true positive

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?