Week 2

Week 2

Professional Development

11 Qs

quiz-placeholder

Similar activities

Fundamentals of Cyber Security

Fundamentals of Cyber Security

Professional Development

15 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Cloud Computing

Cloud Computing

University - Professional Development

10 Qs

IT ENGLISH: Research Project Topics - Encryption

IT ENGLISH: Research Project Topics - Encryption

Professional Development

10 Qs

Prevention

Prevention

1st Grade - Professional Development

10 Qs

ISC2 - Chapter 4 - Module 2

ISC2 - Chapter 4 - Module 2

Professional Development

15 Qs

IT ENGLISH: Research Project Topics - MS Active Directory

IT ENGLISH: Research Project Topics - MS Active Directory

Professional Development

10 Qs

SEC+ Ch.11 Review Test

SEC+ Ch.11 Review Test

Professional Development

15 Qs

Week 2

Week 2

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Dove Soap

Used 3+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

______ finds and eliminates the main factor behind a problem for future prevention.

Indicator of Compromise (IoC)

Root Cause Analysis(RCA)

Identity and Access Management (IAM)

Confidentiality, Integrity, and Availability (CIA)

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two methods used to protect confidentiality?

Intrusion detection systems

Privileged access management

Encryption

Hashing

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The blue team may choose to conduct a simulated phishing campaign to manipulate employees into exposing confidential information.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is used to ensure the integrity of data?

Encryption

Multi-factor authentication

Hashing

Backup

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

System integrity can be protected through a process called

Baselining

Encryption

Authentication

Identification

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A common attack to disrupt availability is a

random attack

data breach

man-in-the-middle

DDos attack

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

YARA is important to security professionals because of its ability to

eradicate malware from your computer

block malicious emails

detect and classify malware

stop suspicious traffic

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?