CEH - Chap 3

CEH - Chap 3

Professional Development

20 Qs

quiz-placeholder

Similar activities

Python Skills

Python Skills

1st Grade - Professional Development

15 Qs

Networking_Sadikur_Exam2_(Part-1)

Networking_Sadikur_Exam2_(Part-1)

Professional Development

20 Qs

Refuerza tu aprendizaje- Cultura digital I -1 er parcial

Refuerza tu aprendizaje- Cultura digital I -1 er parcial

Professional Development

20 Qs

AWN Miniestry

AWN Miniestry

Professional Development

20 Qs

7 ÔT Giữa Hk 1 tin học 7 23 - 24

7 ÔT Giữa Hk 1 tin học 7 23 - 24

Professional Development

25 Qs

Digital Logic Design

Digital Logic Design

University - Professional Development

20 Qs

Internet Basico

Internet Basico

Professional Development

17 Qs

AI-102_MODULE-4

AI-102_MODULE-4

Professional Development

15 Qs

CEH - Chap 3

CEH - Chap 3

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Valérian CASTEL

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

1. To remove malware from the network before it gets to the endpoint, you would use which of the following?
A. Packet filter
B. Application layer gateway
C. Unified threat management appliance
D. Stateful firewall

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

2. If you were on a client engagement and discovered that you left an external hard drive with essential data on it at home, which security principle would you be violating?
A. Confidentiality
B. Integrity
C. Nonrepudiation
D. Availability

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

3. How would you calculate risk?
A. Probability * loss value
B. Probability * mitigation factor
C. (Loss value + mitigation factor) * (loss value/probability)
D. Probability * mitigation factor

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

4. Which of the following is one factor of a defense-in-depth approach to network design?
A. Switches
B. Using Linux on the desktop
C. Optical cable connections
D. Access control lists on routers

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

5. How would you ensure that confidentiality is implemented in an organization?
A. Watchdog processes
B. Encryption
C. Cryptographic hashes
D. Web servers

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

6. An intrusion detection system can perform which of the following functions?
A. Block traffic
B. Filter traffic based on headers
C. Generate alerts on traffic
D. Log system messages

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

7. Which of these would be an example of a loss of integrity?
A. User making changes to a file and saving it
B. Bad blocks flagged on disk
C. Credit cards passed in cleartext
D. Memory failures causing disk drivers to run incorrectly

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?