Search Header Logo

CIS27B Quiz 1 Review Game

Authored by Kasey Nguyen

Computers

12th Grade

24 Questions

Used 13+ times

CIS27B Quiz 1 Review Game
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following techniques allows the organization to identify security vulnerabilities to repair the weaknesses and protect its assets, improve security posture of the organization to gain trust from customers and investors?

ethical hacking

user training

system patching

access control

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Attack tools are identified in which phase of the attack?

clearing tracks and reporting

planning and reconnaissance

probing and targeting

gaining and maintaining access

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following technique is used to extract data from the website when an attacker is footprinting?

web evaluation

web funneling

web scaling

web scraping

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following footprinting techniques entail collecting information without directly accessing the target using search engine, social media and dumpster diving?

parameter footprinting

hidden footprinting

passive footprinting

active footprinting

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of footprinting techniques includes port scanner, ping sweeps, DNS queries?

Service footprinting

Dynamic footprinting

Active footprinting

Passive footprinting

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of social media footprinting entails examining the user’s posted images and videos on the social media website?

profile analysis

content analysis

behavior analysis

sentiment analysis

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following technique is used to assess network vulnerabilities, traffic flow and performance for troubleshooting and improving network availability?

packet sniffing

packet screening

load balancing

traffic filtering

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?