
Risk Management
Quiz
•
Computers
•
9th - 12th Grade
•
Practice Problem
•
Medium
Bill Beliveau
Used 3+ times
FREE Resource
Enhance your content in a minute
24 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following terms identifies the weakness of a system that could lead to compromised information or unauthorized access?
Vulnerability
Hacking
Exploit
Data breach
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Rob has enrolled himself as a network security trainee in JV Internet Securities. Which of the following terms should he know to understand the advantage taken of a software vulnerability that hasn't yet or only very recently become public?
Vulnerability
Zero-day exploit
Exploit
Data breach
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following testing tools combines known scanning and exploit techniques to explore potentially new attack routes?
Nmap
Nessus
Metasploit
Honeypot
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of DoS (denial-of-service) attack that is bounced off uninfected computers before being directed at the target?
PDoS attack
Amplified DRDoS attack
DRDoS attack
DDoS attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Certain checks and balances must also be maintained and defined in the policy measures in detail. Which of the following security policies should be used in this scenario?
An NDA (non-disclosure agreement)
An anti-malware policy
A PUA (privileged user agreement)
An AUP (acceptable use policy)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Kickstart Securities provides network analysis and safety measurement services to various clients. Recently, one of its clients has requested a technician to run a cross-check on the network system to ensure that there are no vulnerabilities that are exposed. You have been sent in to assess the situation and fix the errors if there are any. Which of the following will you use in such a scenario to track the vulnerabilities across systems?
Quid pro quo
Phishing
Zero-day exploit
CVE
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Zeneth Computers is a software development company. It has received a random email claiming that there will be an attempt to hack and extract sensitive financial data of the company before the year end. The company has contacted you, a network analyst, to verify if such claims are indeed true. You have decided to set up a trap for the hackers by putting up a system containing false financial data. Which of the following will you use in this scenario?
Nmap
Nessus
Metasploit
Honeypot
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Q1 M3 PRE-TEST
Quiz
•
10th Grade
20 questions
Quiz ASJ
Quiz
•
12th Grade
20 questions
Computer Science - X
Quiz
•
8th - 10th Grade
20 questions
Quiz
•
7th - 12th Grade
21 questions
Lecture Exercise Topic 1.3
Quiz
•
12th Grade
20 questions
Unit Test 1 Class 8 Computer
Quiz
•
8th - 9th Grade
20 questions
Software
Quiz
•
10th Grade
25 questions
HTML
Quiz
•
11th Grade
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
