Search Header Logo

Final Last Quiz

Authored by cdi college

Computers

KG - Professional Development

Used 2+ times

Final Last Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Most information security breaches start with the

compromise of small pieces of an organization’s infrastructure—often one or two systems at a time. these targets are called

Initial breach targets

last breach targets

middle breach targets

All of these

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which model identify the risk that the use of highly privileged accounts for day-to-day administration presents, in addition to providing recommendations to reduce that risk.

Least privilege Model

Role based access model

BIBA model

SIPA Model

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Windows security event logs have categories and

subcategories that determine which security events are tracked and recorded.

True

False

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

The accounts in Active Directory that are most commonly targeted by attackers are those that are members of the less privileged groups,

True

False

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Pass-the-hash (PTH) and other credential theft attacks are ubiquitous today, it is because there is freely available tooling that makes it simple and easy to extract the credentials of other privileged accounts when an attacker has gained Administrator- or SYSTEM-level access to a computer.

True

False

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Whether an organization deploys consistent baseline settings across servers, the installation of applications that are part of a server’s defined role should not be

permitted.

True

False

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Root-cause analysis of enterprise-wide 27 Best Practices for Securing Active Directory incidents often reveals that an initial compromise is effected through custom applications–particularly those that are Internet facing.

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?