
Final Last Quiz
Authored by cdi college
Computers
KG - Professional Development
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Most information security breaches start with the
compromise of small pieces of an organization’s infrastructure—often one or two systems at a time. these targets are called
Initial breach targets
last breach targets
middle breach targets
All of these
2.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Which model identify the risk that the use of highly privileged accounts for day-to-day administration presents, in addition to providing recommendations to reduce that risk.
Least privilege Model
Role based access model
BIBA model
SIPA Model
3.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Windows security event logs have categories and
subcategories that determine which security events are tracked and recorded.
True
False
4.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
The accounts in Active Directory that are most commonly targeted by attackers are those that are members of the less privileged groups,
True
False
5.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Pass-the-hash (PTH) and other credential theft attacks are ubiquitous today, it is because there is freely available tooling that makes it simple and easy to extract the credentials of other privileged accounts when an attacker has gained Administrator- or SYSTEM-level access to a computer.
True
False
6.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Whether an organization deploys consistent baseline settings across servers, the installation of applications that are part of a server’s defined role should not be
permitted.
True
False
7.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Root-cause analysis of enterprise-wide 27 Best Practices for Securing Active Directory incidents often reveals that an initial compromise is effected through custom applications–particularly those that are Internet facing.
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Computer basics for beginners
Quiz
•
Professional Development
20 questions
Software Engineering Quiz 1
Quiz
•
University
15 questions
1.1.1 The structure and function of the processor
Quiz
•
11th Grade - University
15 questions
LEDs on micro:bit
Quiz
•
8th Grade
20 questions
Asas Komputer
Quiz
•
3rd Grade
18 questions
CIS2303 Week 4_5 Ch_3
Quiz
•
University
20 questions
WML & WAP
Quiz
•
University
15 questions
REVIEW QUIZ
Quiz
•
7th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade