Search Header Logo

Prems Slides Review 1.0

Authored by Prem Jadhwani

Computers

Professional Development

Used 15+ times

Prems Slides Review 1.0
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This information is gathered from open sources such as websites, social media, public records, news articles, and other publicly accessible data.

RADIUS

AAA

OSINT

FTP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of web security vulnerability that allows an attacker to perform actions on behalf of a user without their consent.

Cross-Site Scripting

Cross-Site Privilege Escalation

Cross-Site Request Forgery

Cross-Site Code Request

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A legal process in which an organization or individual is required to preserve all relevant documents, data, and information that may be pertinent to a pending or anticipated legal case or investigation.

Chain of Custody

Data Owner

Data Copying

Legal Hold

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A process that documents who has had access to evidence, when and where it was collected, and any changes or transfers made. The process is specifically used for integrity and authenticity of evidence.

Data Copying

Chain of Custody

Legal Hold

Data Management

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A predefined set of guidelines, procedures, and instructions that outlines the actions to be taken during various stages of an incident.

Playbook

Training, Tactics and Procedures

Incident Triage

Threat Huntinh

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to verify a users credentials without storing the actual sensitive data (the user's password) in plaintext. They want to use an option that will not allow an attacker to reverse engineer the original password. What should they use?

Password Complexity

Password Policy

Password Encryption

Password Hashing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security solution that helps organizations extend their security policies and controls to the cloud.

Encryption

Data Loss Prevention

Cloud Access Security Broker

Security Access Secure Edge

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?