Security + quiz 14

Security + quiz 14

Professional Development

14 Qs

quiz-placeholder

Similar activities

CNC introduction

CNC introduction

Professional Development

13 Qs

BCS Network Security Test 2

BCS Network Security Test 2

University - Professional Development

18 Qs

Introducción Google Docs

Introducción Google Docs

KG - Professional Development

10 Qs

FOTOGRAFÍA DIGITAL SEMANA 3

FOTOGRAFÍA DIGITAL SEMANA 3

Professional Development

10 Qs

Recursos dixitais de apoio ao labor docente (Módulo 14)

Recursos dixitais de apoio ao labor docente (Módulo 14)

Professional Development

12 Qs

KUIS KE 2 SEMINAR NASIONAL KEFARMASIAN (HMPF-USB)

KUIS KE 2 SEMINAR NASIONAL KEFARMASIAN (HMPF-USB)

Professional Development

15 Qs

Principles of Electronic Communication ; A review

Principles of Electronic Communication ; A review

Professional Development

10 Qs

Ensino híbrido

Ensino híbrido

Professional Development

12 Qs

Security + quiz 14

Security + quiz 14

Assessment

Quiz

Instructional Technology

Professional Development

Practice Problem

Hard

Created by

Matt Hansen

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A nuclear plant was the victim of a recent attack, and all the networks were air gapped. A subsequent investigation revealed a worm as the source of the issue. Which of the following BEST explains what happened?

A malicious USB was introduced by an unsuspecting employee.

The ICS firmware was outdated

A local machine has a RAT installed.

The HVAC was connected to the maintenance vendor.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Under GDPR, which of the following is MOST responsible for the protection of privacy and website user rights?

The data protection officer

The data processor

The data owner

The data controller

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user recent an SMS on a mobile phone that asked for bank delays. Which of the following social-engineering techniques was used in this case?

SPIM

Vishing

Spear phishing

Smishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator needs to create a RAIS configuration that is focused on high read speeds and fault tolerance. It is unlikely that multiple drivers will fail simultaneously. Which of the following RAID configurations should the administration use?

RA1D 0

RAID1

RAID 5

RAID 10

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is concerned that a web application will not be able to handle unexpected or random input without crashing. Which of the following BEST describes the type of testing the user should perform?

Code signing

Fuzzing

Manual code review

Dynamic code analysis

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator checks the table of a network switch, which shows the following output:

VLAN Physical Address Type Port

1 001a:42ff:5113 Dynamic GEO/5

1 0faa:abcf:ddee Dynamic GEO/5

1 c6a9:6b16:750e Dynamic GEO/5

1 a3aa:b6a3:1212 Dynamic GEO/5

1 8025:2ad8:bfac Dynamic GEO/5

1 b839:f995:a00a Dynamic GEO/5

Which of the following is happening to this switch?

MAC Flooding

DNS poisoning

MAC cloning

ARP poisoning

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company needs to centralize its logs to create a baseline and have visibility on its security events. Which of the following technologies will accomplish this objective?

Security information and event management

A web application firewall

A vulnerability scanner

A next-generation firewall

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology