
Cyber Quiz
Authored by Dove Soap
Computers
Professional Development
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
17 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is a sandbox interprocess communication service?
A collection of host services that allow for communication between sandboxes
A collection of interfaces that allow for coordination of activities among processes
A collection of network services that are activated on an interface, allowing for inter-port communication.
A collection of rules within the sandbox that prevent the communication between sandboxes
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What causes events on a Windows system to show Event Code 4625 in the log messages?
Someone is trying a brute force attack on the network
Another device is gaining root access to the system
The system detected an XSS attack
A privileged user successfully logged into the system
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which type of data consists of connection level, application-specific records generated from network traffic?
statistical data
alert data
location data
transaction data
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
How is NetFlow different from traffic mirroring?
NetFlow generates more data than traffic mirroring
NetFlow collects metadata and traffic mirroring clones data
Traffic mirroring costs less to operate than NetFlow
Traffic mirroring impacts switch performance and NetFlow does no
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An analyst discovers that a legitimate security alert has been dismissed.Which signature caused this impact on the network traffic?
true negative
true positive
false negative
false positive
6.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in thenetwork?
Inline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies
Tapping interrogation replicates signals to a separate port for analyzing traffic
Inline interrogation detects malicious traffic but does not block the traffic
Tapping interrogations detect and block malicious traffic
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which signature impacts network traffic by causing legitimate traffic to be blocked?
true negative
false negative
false positive
true positive
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?