Risk Management

Risk Management

9th - 12th Grade

24 Qs

quiz-placeholder

Similar activities

Materi 1 SO dan SOJ (PRE TEST )

Materi 1 SO dan SOJ (PRE TEST )

11th Grade

20 Qs

Recusion

Recusion

12th Grade

19 Qs

Arduino_Quiz

Arduino_Quiz

12th Grade

20 Qs

History of the computer

History of the computer

12th Grade

20 Qs

แบบทดสอบหลังเรียน หน่วยที่ 1 ความรู้เบื้องต้นเกี่ยวกับการจัดการฐานข้อมูล

แบบทดสอบหลังเรียน หน่วยที่ 1 ความรู้เบื้องต้นเกี่ยวกับการจัดการฐานข้อมูล

10th Grade

20 Qs

Django-quiz

Django-quiz

5th Grade - University

20 Qs

แบบทดสอบปลายภาค Photoshop

แบบทดสอบปลายภาค Photoshop

9th - 12th Grade

20 Qs

QUIZ 3 SAM

QUIZ 3 SAM

12th Grade

20 Qs

Risk Management

Risk Management

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Bill Beliveau

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms identifies the weakness of a system that could lead to compromised information or unauthorized access?

Vulnerability

Hacking

Exploit

Data breach

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rob has enrolled himself as a network security trainee in JV Internet Securities. Which of the following terms should he know to understand the advantage taken of a software vulnerability that hasn't yet or only very recently become public?

Vulnerability

Zero-day exploit

Exploit

Data breach

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following testing tools combines known scanning and exploit techniques to explore potentially new attack routes?

Nmap

Nessus

Metasploit

Honeypot

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of DoS (denial-of-service) attack that is bounced off uninfected computers before being directed at the target?

PDoS attack

Amplified DRDoS attack

DRDoS attack

DDoS attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Certain checks and balances must also be maintained and defined in the policy measures in detail. Which of the following security policies should be used in this scenario?

An NDA (non-disclosure agreement)

An anti-malware policy

A PUA (privileged user agreement)

An AUP (acceptable use policy)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kickstart Securities provides network analysis and safety measurement services to various clients. Recently, one of its clients has requested a technician to run a cross-check on the network system to ensure that there are no vulnerabilities that are exposed. You have been sent in to assess the situation and fix the errors if there are any. Which of the following will you use in such a scenario to track the vulnerabilities across systems?

Quid pro quo

Phishing

Zero-day exploit

CVE

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Zeneth Computers is a software development company. It has received a random email claiming that there will be an attempt to hack and extract sensitive financial data of the company before the year end. The company has contacted you, a network analyst, to verify if such claims are indeed true. You have decided to set up a trap for the hackers by putting up a system containing false financial data. Which of the following will you use in this scenario?

Nmap

Nessus

Metasploit

Honeypot

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?