Search Header Logo

Week 2

Authored by Dove Soap

Computers

Professional Development

Used 3+ times

Week 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

______ finds and eliminates the main factor behind a problem for future prevention.

Indicator of Compromise (IoC)

Root Cause Analysis(RCA)

Identity and Access Management (IAM)

Confidentiality, Integrity, and Availability (CIA)

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two methods used to protect confidentiality?

Intrusion detection systems

Privileged access management

Encryption

Hashing

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The blue team may choose to conduct a simulated phishing campaign to manipulate employees into exposing confidential information.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is used to ensure the integrity of data?

Encryption

Multi-factor authentication

Hashing

Backup

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

System integrity can be protected through a process called

Baselining

Encryption

Authentication

Identification

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A common attack to disrupt availability is a

random attack

data breach

man-in-the-middle

DDos attack

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

YARA is important to security professionals because of its ability to

eradicate malware from your computer

block malicious emails

detect and classify malware

stop suspicious traffic

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?