
Security + quiz 14
Authored by Matt Hansen
Instructional Technology
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A nuclear plant was the victim of a recent attack, and all the networks were air gapped. A subsequent investigation revealed a worm as the source of the issue. Which of the following BEST explains what happened?
A malicious USB was introduced by an unsuspecting employee.
The ICS firmware was outdated
A local machine has a RAT installed.
The HVAC was connected to the maintenance vendor.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Under GDPR, which of the following is MOST responsible for the protection of privacy and website user rights?
The data protection officer
The data processor
The data owner
The data controller
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user recent an SMS on a mobile phone that asked for bank delays. Which of the following social-engineering techniques was used in this case?
SPIM
Vishing
Spear phishing
Smishing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security administrator needs to create a RAIS configuration that is focused on high read speeds and fault tolerance. It is unlikely that multiple drivers will fail simultaneously. Which of the following RAID configurations should the administration use?
RA1D 0
RAID1
RAID 5
RAID 10
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user is concerned that a web application will not be able to handle unexpected or random input without crashing. Which of the following BEST describes the type of testing the user should perform?
Code signing
Fuzzing
Manual code review
Dynamic code analysis
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security administrator checks the table of a network switch, which shows the following output:
VLAN Physical Address Type Port
1 001a:42ff:5113 Dynamic GEO/5
1 0faa:abcf:ddee Dynamic GEO/5
1 c6a9:6b16:750e Dynamic GEO/5
1 a3aa:b6a3:1212 Dynamic GEO/5
1 8025:2ad8:bfac Dynamic GEO/5
1 b839:f995:a00a Dynamic GEO/5
Which of the following is happening to this switch?
MAC Flooding
DNS poisoning
MAC cloning
ARP poisoning
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company needs to centralize its logs to create a baseline and have visibility on its security events. Which of the following technologies will accomplish this objective?
Security information and event management
A web application firewall
A vulnerability scanner
A next-generation firewall
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?