Incident Handling

Incident Handling

University

13 Qs

quiz-placeholder

Similar activities

PEC 101 Educ. Technology

PEC 101 Educ. Technology

University

15 Qs

Interesting Bird Facts

Interesting Bird Facts

KG - Professional Development

11 Qs

Cloud migration prerequisite

Cloud migration prerequisite

University - Professional Development

15 Qs

CNS Transport layer

CNS Transport layer

University

15 Qs

Module 2 Lesson 2 Part 2 Assessment

Module 2 Lesson 2 Part 2 Assessment

University

10 Qs

Removal Exam for PM-108

Removal Exam for PM-108

University

10 Qs

Random Construction Questions

Random Construction Questions

11th Grade - University

16 Qs

Programming in C language

Programming in C language

12th Grade - University

18 Qs

Incident Handling

Incident Handling

Assessment

Quiz

Instructional Technology

University

Practice Problem

Hard

Created by

Jason Webb

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

13 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are types of HTTP request methods? (Choose all that apply).

PLACE

GET

POST

HEAD

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following HTTP response code indicate success?

500

300

200

400

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A URL is composed of which two components?

Protocol

URI

Domain

IP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encoding type is generally represented by a percent character "%" followed by two hexadecimal digits?

Base32

Base64

Hashing

URL Encoding

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following string is an example of what within an HTTP header? "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 (.NET CLR 3.5.30729)"

User Agent

Content Type

Cookie

Referrer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any occurrence in a network or system, such as opening a file or restarting the computer is considered what?

Log

Incident

Event

Anomaly

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which source of information would most likely contain events surrounding possible data exfiltration?

IDS/IPS

SIEM

DLP

EDR

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?