Search Header Logo

Security+ Final Exam Quizizz

Authored by Joanne Phillips-Edley

Computers

University

Used 12+ times

Security+ Final Exam Quizizz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of threat actor would benefit the most from accessing your enterprise's new machine learning algorithm research and development program?

Shadow IT

Brokers

Criminal Syndicates

Competitors

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your enterprise has played fast and loose with customer information for years. While there has been no significant breach of information that could damage the organization and/or their customers, many in the enterprise feel it is only a matter of time before a major leak occurs.

Which type of threat actor is an employee who wishes to personally ensure that the enterprise is exposed and blocked from accessing their customers' information until they ensure more secure protocols?

Hacktivist

Insider

State actor

Script kiddy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company recently purchased routers with new and updated features and deployed them in the highly secure enterprise network without changing the default settings. A few days later, the enterprise network suffered a data breach, and you are assigned to prepare a report on the data breach. Which of the following vulnerabilities should you identify as the source of the breach?

Platform vulnerability

Configuration vulnerability

Third-party vulnerability

Zero-day vulnerability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Khalid joins a security team where he is assigned an SOC developer role and has to build different teams under SOC. Which of the following teams should he build to deal with providing real-time feedback related to security incidents and threat detections, which can then be utilized to facilitate better prioritization of threats and a mature way of detecting threats?

Red team

Blue team

Purple team

White team

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following penetration testing consultants have limited knowledge of the network and some elevated privileges?

Gray box

White box

Black Box

Bug bounty

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which operation is carried out by proactively searching security logs for cyber threats that have thus far gone undetected?

Threat hunting

Vulnerability hunting

Vulnerability scanning

Data hunting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Juan, a cybersecurity expert, has been hired by an organization whose networks have been compromised by a malware attack. After analyzing the network systems, Juan submits a report to the company mentioning that the devices are infected with malware that uses a split infection technique on files.

Which malware attack is Juan reporting?

Cryptomalware

Virus

Spyware

RAT

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?