Prems Slides Review 1.0

Prems Slides Review 1.0

Professional Development

10 Qs

quiz-placeholder

Similar activities

 Review ITNS 2 part 2

Review ITNS 2 part 2

9th Grade - Professional Development

13 Qs

Cyber Security Quiz

Cyber Security Quiz

Professional Development

10 Qs

OWASP Top 10

OWASP Top 10

Professional Development

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

SEC+ Ch.11 Review Test

SEC+ Ch.11 Review Test

Professional Development

15 Qs

Cyber Security ISA WRTD

Cyber Security ISA WRTD

Professional Development

11 Qs

Security+ Study Guide-11 Implement Policies to Mitigating Risks

Security+ Study Guide-11 Implement Policies to Mitigating Risks

Professional Development

15 Qs

Kuiz Cyber Threat Alliance Programme

Kuiz Cyber Threat Alliance Programme

Professional Development

12 Qs

Prems Slides Review 1.0

Prems Slides Review 1.0

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Prem Jadhwani

Used 15+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This information is gathered from open sources such as websites, social media, public records, news articles, and other publicly accessible data.

RADIUS

AAA

OSINT

FTP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of web security vulnerability that allows an attacker to perform actions on behalf of a user without their consent.

Cross-Site Scripting

Cross-Site Privilege Escalation

Cross-Site Request Forgery

Cross-Site Code Request

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A legal process in which an organization or individual is required to preserve all relevant documents, data, and information that may be pertinent to a pending or anticipated legal case or investigation.

Chain of Custody

Data Owner

Data Copying

Legal Hold

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A process that documents who has had access to evidence, when and where it was collected, and any changes or transfers made. The process is specifically used for integrity and authenticity of evidence.

Data Copying

Chain of Custody

Legal Hold

Data Management

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A predefined set of guidelines, procedures, and instructions that outlines the actions to be taken during various stages of an incident.

Playbook

Training, Tactics and Procedures

Incident Triage

Threat Huntinh

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to verify a users credentials without storing the actual sensitive data (the user's password) in plaintext. They want to use an option that will not allow an attacker to reverse engineer the original password. What should they use?

Password Complexity

Password Policy

Password Encryption

Password Hashing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security solution that helps organizations extend their security policies and controls to the cloud.

Encryption

Data Loss Prevention

Cloud Access Security Broker

Security Access Secure Edge

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?