
Prems Slides Review 1.0
Authored by Prem Jadhwani
Computers
Professional Development
Used 15+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This information is gathered from open sources such as websites, social media, public records, news articles, and other publicly accessible data.
RADIUS
AAA
OSINT
FTP
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A type of web security vulnerability that allows an attacker to perform actions on behalf of a user without their consent.
Cross-Site Scripting
Cross-Site Privilege Escalation
Cross-Site Request Forgery
Cross-Site Code Request
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A legal process in which an organization or individual is required to preserve all relevant documents, data, and information that may be pertinent to a pending or anticipated legal case or investigation.
Chain of Custody
Data Owner
Data Copying
Legal Hold
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A process that documents who has had access to evidence, when and where it was collected, and any changes or transfers made. The process is specifically used for integrity and authenticity of evidence.
Data Copying
Chain of Custody
Legal Hold
Data Management
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A predefined set of guidelines, procedures, and instructions that outlines the actions to be taken during various stages of an incident.
Playbook
Training, Tactics and Procedures
Incident Triage
Threat Huntinh
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company wants to verify a users credentials without storing the actual sensitive data (the user's password) in plaintext. They want to use an option that will not allow an attacker to reverse engineer the original password. What should they use?
Password Complexity
Password Policy
Password Encryption
Password Hashing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security solution that helps organizations extend their security policies and controls to the cloud.
Encryption
Data Loss Prevention
Cloud Access Security Broker
Security Access Secure Edge
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?