Cyber Day 1 Quiz

Cyber Day 1 Quiz

Professional Development

10 Qs

quiz-placeholder

Similar activities

REPAIRS VS ALTERATIONS

REPAIRS VS ALTERATIONS

Professional Development

10 Qs

Watsons Weekly Exam | September Week 01

Watsons Weekly Exam | September Week 01

Professional Development

10 Qs

SAP S4 Hana Quiz 1

SAP S4 Hana Quiz 1

Professional Development

10 Qs

SvensQA Software Testing

SvensQA Software Testing

Professional Development

15 Qs

Azure Compute Services

Azure Compute Services

Professional Development

15 Qs

PPVT Review Quiz

PPVT Review Quiz

Professional Development

12 Qs

C Programming

C Programming

Professional Development

15 Qs

CRM Super Hero Ready!

CRM Super Hero Ready!

Professional Development

15 Qs

Cyber Day 1 Quiz

Cyber Day 1 Quiz

Assessment

Quiz

Other

Professional Development

Hard

Created by

Michaela Flowers

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Adam is conducting software testing by reviewing the source code of the application. What type is code testing is Adam conducting?

Mutation testing

Static code analysis

Dynamic code analysis

Fuzzing

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What type of attack places an attacker in the position to eavesdrop on communication between a user and a web server?

Man-in-the-middle

Session hijacking

Buffer overflow

Meet-in-the-middle

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt


Which one of the following objectives is not one of the 3 main objectives that information security professionals must achieve to protect their organisations against cybersecurity threats?

Integrity

Nonrepudiation

Availability

Confidentiality

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Tom is a software developer who creates code for sale to the public. He would like to assure his users that the code they receive actually came from him. What technique can he use to best provide this assurance?

Code signing

Code endorsement

Code encryption

Code obfuscation

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Ursula recently discovered that a group of developers are sharing information over a messaging tool provided by a cloud vendor but not sanctioned by her organisation. What term best describes this use of technology?

Shadow IT

System integration

Vendor management

Data exfiltration

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Wendy is scanning cloud based repositories for sensitive information. Which one of the following should concern her most if discovered in a public repository

Product manuals

Secure code

API keys

Open source data

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What type of malware connects to a command and control system allowing attackers to manage, control and update it remotely?

Bot

Drone

Vampire

Worm

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?