Risk Management

Risk Management

9th - 12th Grade

24 Qs

quiz-placeholder

Similar activities

Y9 Creative iMedia RO81 Quiz Part 1

Y9 Creative iMedia RO81 Quiz Part 1

9th Grade

21 Qs

CSS 10 - QUIZ

CSS 10 - QUIZ

10th Grade

20 Qs

Data Manipulation IGCSE (Introduction to database) Grade 10

Data Manipulation IGCSE (Introduction to database) Grade 10

10th - 11th Grade

20 Qs

CHỦ ĐỀ A. MÁY TÍNH VÀ XÃ HỘI TRÍ THỨC P1

CHỦ ĐỀ A. MÁY TÍNH VÀ XÃ HỘI TRÍ THỨC P1

10th Grade

20 Qs

Yr 11 ICT quiz 1 Networks & Security

Yr 11 ICT quiz 1 Networks & Security

10th - 11th Grade

20 Qs

CSS GRADE 9 - QUIZ PECs and EM

CSS GRADE 9 - QUIZ PECs and EM

9th Grade

20 Qs

Written Works 4 (ICT A)

Written Works 4 (ICT A)

11th Grade

20 Qs

Quiz Informatika

Quiz Informatika

11th Grade

20 Qs

Risk Management

Risk Management

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Bill Beliveau

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms identifies the weakness of a system that could lead to compromised information or unauthorized access?

Vulnerability

Hacking

Exploit

Data breach

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rob has enrolled himself as a network security trainee in JV Internet Securities. Which of the following terms should he know to understand the advantage taken of a software vulnerability that hasn't yet or only very recently become public?

Vulnerability

Zero-day exploit

Exploit

Data breach

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following testing tools combines known scanning and exploit techniques to explore potentially new attack routes?

Nmap

Nessus

Metasploit

Honeypot

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of DoS (denial-of-service) attack that is bounced off uninfected computers before being directed at the target?

PDoS attack

Amplified DRDoS attack

DRDoS attack

DDoS attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Certain checks and balances must also be maintained and defined in the policy measures in detail. Which of the following security policies should be used in this scenario?

An NDA (non-disclosure agreement)

An anti-malware policy

A PUA (privileged user agreement)

An AUP (acceptable use policy)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kickstart Securities provides network analysis and safety measurement services to various clients. Recently, one of its clients has requested a technician to run a cross-check on the network system to ensure that there are no vulnerabilities that are exposed. You have been sent in to assess the situation and fix the errors if there are any. Which of the following will you use in such a scenario to track the vulnerabilities across systems?

Quid pro quo

Phishing

Zero-day exploit

CVE

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Zeneth Computers is a software development company. It has received a random email claiming that there will be an attempt to hack and extract sensitive financial data of the company before the year end. The company has contacted you, a network analyst, to verify if such claims are indeed true. You have decided to set up a trap for the hackers by putting up a system containing false financial data. Which of the following will you use in this scenario?

Nmap

Nessus

Metasploit

Honeypot

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?