Final Last Quiz

Final Last Quiz

KG - Professional Development

20 Qs

quiz-placeholder

Similar activities

cyber awareness

cyber awareness

University

20 Qs

Computer Networks

Computer Networks

8th Grade

20 Qs

Networking Concepts

Networking Concepts

6th - 7th Grade

16 Qs

OCR Computer Science Networks

OCR Computer Science Networks

9th Grade

19 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

Password & security

Password & security

7th - 8th Grade

15 Qs

Cyber Security

Cyber Security

5th Grade - Professional Development

20 Qs

Day 4 - Security I - Day 3 Review - 1st Review

Day 4 - Security I - Day 3 Review - 1st Review

Professional Development

22 Qs

Final Last Quiz

Final Last Quiz

Assessment

Quiz

Computers

KG - Professional Development

Easy

Created by

cdi college

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Most information security breaches start with the

compromise of small pieces of an organization’s infrastructure—often one or two systems at a time. these targets are called

Initial breach targets

last breach targets

middle breach targets

All of these

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which model identify the risk that the use of highly privileged accounts for day-to-day administration presents, in addition to providing recommendations to reduce that risk.

Least privilege Model

Role based access model

BIBA model

SIPA Model

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Windows security event logs have categories and

subcategories that determine which security events are tracked and recorded.

True

False

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

The accounts in Active Directory that are most commonly targeted by attackers are those that are members of the less privileged groups,

True

False

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Pass-the-hash (PTH) and other credential theft attacks are ubiquitous today, it is because there is freely available tooling that makes it simple and easy to extract the credentials of other privileged accounts when an attacker has gained Administrator- or SYSTEM-level access to a computer.

True

False

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Whether an organization deploys consistent baseline settings across servers, the installation of applications that are part of a server’s defined role should not be

permitted.

True

False

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Root-cause analysis of enterprise-wide 27 Best Practices for Securing Active Directory incidents often reveals that an initial compromise is effected through custom applications–particularly those that are Internet facing.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?