
Security + quiz 14
Quiz
•
Instructional Technology
•
Professional Development
•
Practice Problem
•
Hard
Matt Hansen
FREE Resource
Enhance your content in a minute
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A nuclear plant was the victim of a recent attack, and all the networks were air gapped. A subsequent investigation revealed a worm as the source of the issue. Which of the following BEST explains what happened?
A malicious USB was introduced by an unsuspecting employee.
The ICS firmware was outdated
A local machine has a RAT installed.
The HVAC was connected to the maintenance vendor.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Under GDPR, which of the following is MOST responsible for the protection of privacy and website user rights?
The data protection officer
The data processor
The data owner
The data controller
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user recent an SMS on a mobile phone that asked for bank delays. Which of the following social-engineering techniques was used in this case?
SPIM
Vishing
Spear phishing
Smishing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security administrator needs to create a RAIS configuration that is focused on high read speeds and fault tolerance. It is unlikely that multiple drivers will fail simultaneously. Which of the following RAID configurations should the administration use?
RA1D 0
RAID1
RAID 5
RAID 10
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user is concerned that a web application will not be able to handle unexpected or random input without crashing. Which of the following BEST describes the type of testing the user should perform?
Code signing
Fuzzing
Manual code review
Dynamic code analysis
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security administrator checks the table of a network switch, which shows the following output:
VLAN Physical Address Type Port
1 001a:42ff:5113 Dynamic GEO/5
1 0faa:abcf:ddee Dynamic GEO/5
1 c6a9:6b16:750e Dynamic GEO/5
1 a3aa:b6a3:1212 Dynamic GEO/5
1 8025:2ad8:bfac Dynamic GEO/5
1 b839:f995:a00a Dynamic GEO/5
Which of the following is happening to this switch?
MAC Flooding
DNS poisoning
MAC cloning
ARP poisoning
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company needs to centralize its logs to create a baseline and have visibility on its security events. Which of the following technologies will accomplish this objective?
Security information and event management
A web application firewall
A vulnerability scanner
A next-generation firewall
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Realidad aumentada
Quiz
•
Professional Development
12 questions
Diagrama de Fases Cu-Ni
Quiz
•
Professional Development
12 questions
CARBURADORES
Quiz
•
Professional Development
10 questions
Model dan Media Pembelajaran Inovatif
Quiz
•
University - Professi...
15 questions
Distancing
Quiz
•
Professional Development
10 questions
SFRP December 2023 Knowledge Check
Quiz
•
Professional Development
10 questions
Cycle 2: Session 3 Review.
Quiz
•
Professional Development
12 questions
Conceptos básicos de diseño
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
