Search Header Logo

Appsec Quiz

Authored by Eagle ToLearn

Computers

University

Used 9+ times

Appsec Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does integrity of data refer to?

The level of assurance which can be given as to how structured data is.

The level of assurance which can be given as to how strong data is.

The level of assurance which can be given as to how accurate and trustworthy data is.

The level of assurance which can be given as to how relevant the data is.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What term is used to describe the property of a secure network where a sender cannot deny having sent a message?

Integrity

Security mechanism

Non-repudiation

Confidentiality

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In which type of attack does the attacker begin with a normal user account and then seeks to gain additional access rights?

SQL Injection

Spear phishing

Privilege escalation

Remote code execution

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Your company's Security Operations Center (SOC) is currently detecting an ongoing DDoS attack against your network's file server. One of the cybersecurity analysts has identified forty internal workstations on the network that are conducting the attack against your network's file server. The cybersecurity analyst believes these internal workstations are infected with malware and places them into a quarantined area of the network. The analyst then submits a service desk ticket to have the workstations scanned and cleaned of the infection. What type of malware was the workstation likely a victim of based on the scenario provided?

Spyware

Rootkit

Ransomware

Botnet

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The Security Operations Center Director for Googl3 received a pop-up message on his workstation that said, “You will regret firing me; just wait until Christmas!” He suspects the message came from a disgruntled former employee that may have set up a piece of software to create this pop-up on his machine. The director is now concerned that other code might be lurking within the network that could create a negative effect on Christmas. He directs his team of cybersecurity analysts to begin searching the network for this suspicious code. What type of malware should they be searching for?

Worm

Logic Bomb

Trojan

Adware

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A firewall appliance intercepts a packet that violates policy. It automatically updates its Access Control List to block all further packets from the source IP. What TWO functions is the security control performing?


Detective and Preventive

Preventive and Corrective

Technical and Operational

Technical and Physical

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You have implemented a secure web gateway that blocks access to a social networking site. How would you categorize this type of security control?

Physical

Operational

Technical

Managerial

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?