Cybersecurity Quiz CompTIA 2

Cybersecurity Quiz CompTIA 2

12th Grade

100 Qs

quiz-placeholder

Similar activities

QuiZ IPS ASEAN KELAS 6

QuiZ IPS ASEAN KELAS 6

12th Grade

100 Qs

Physical Education and Health 12 Prelim Exam

Physical Education and Health 12 Prelim Exam

12th Grade

100 Qs

Review ECE 1 Dec 2018

Review ECE 1 Dec 2018

9th - 12th Grade

96 Qs

KUIZ INTERAKTIF 6K

KUIZ INTERAKTIF 6K

5th Grade - University

100 Qs

Hair & Scalp Care: Haircutting / Hairstyling

Hair & Scalp Care: Haircutting / Hairstyling

12th Grade

100 Qs

gk quiz

gk quiz

KG - Professional Development

100 Qs

Naval Science 4 SEM1 EOC Test

Naval Science 4 SEM1 EOC Test

12th Grade

95 Qs

PR2 BATTERY TEST

PR2 BATTERY TEST

12th Grade

100 Qs

Cybersecurity Quiz CompTIA 2

Cybersecurity Quiz CompTIA 2

Assessment

Quiz

Other

12th Grade

Medium

Created by

Breanna Norton

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

100 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security engineer is concerned that the strategy for detection on endpoints is too heavily dependent on previously defined attacks. The engineer would like a tool to monitor for changes to key files and network traffic on the device. Which of the following tools BEST addresses both detection and prevention?

NIDS(Network based intrusion detection system

AV(antivirus)

HIPs(Host-based intrusion prevention system)

NGFW( Next Generation Firewall)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A forensics investigator is examining a number of unauthorized payments that were reported on the company's website. Some unusual log entries show users received an email for an unwanted mailing list and clicked on a link to attempt to unsubscribe. One of the users reported the email to the phishing team, and the forwarded email revealed the link to be: .

<a href=https://www.company.com/payto.do?routing=00001111&acct=22223334&amount=250">Click here to unsubscribe</a>

Which of the following will the forensics investigator MOST likely determine has occurred?

SQL(structured query language) injection

Broken authentication

XSS(Cross site scripting)

XSRF(Cross site request forgery)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following employee roles is responsible for protecting an organization's collected personal information?

CTO (Chief Technology Officer)

DPO( Data protection officer)

CEO

DBA (database administrator)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is under investigation for possible fraud. As part of the investigation, the authorities need to review all emails and ensure data is not deleted. Which of the following should the company implement to assist in the investigation?

Legal hold

Chain of custody

Data loss prevention

Content filter

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would BEST provide detective and corrective controls for thermal regulation?

A smoke detector

Fire Alarm

An HVAC System

A fire suppression system

Guards

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms should be included in a contract to help a company monitor the ongoing security maturity of a new vendor?

A right-to-audit clause allowing for annual security audits

Requirements for event logs to be kept for a minimum of 30 days

Integration of threat intelligence in the company’s AV (Antivirus)

A data-breach clause requiring disclosure of significant data loss

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A systems administrator is troubleshooting a server's connection to an internal web server. The administrator needs to determine the correct ports to use. Which of the following tools BEST shows which ports on the web server are in a listening state?

ipconfig

ssh

ping

netstat

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?