
Risk Management
Quiz
•
Computers
•
9th - 12th Grade
•
Practice Problem
•
Medium
Bill Beliveau
Used 3+ times
FREE Resource
Enhance your content in a minute
24 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following terms identifies the weakness of a system that could lead to compromised information or unauthorized access?
Vulnerability
Hacking
Exploit
Data breach
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Rob has enrolled himself as a network security trainee in JV Internet Securities. Which of the following terms should he know to understand the advantage taken of a software vulnerability that hasn't yet or only very recently become public?
Vulnerability
Zero-day exploit
Exploit
Data breach
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following testing tools combines known scanning and exploit techniques to explore potentially new attack routes?
Nmap
Nessus
Metasploit
Honeypot
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of DoS (denial-of-service) attack that is bounced off uninfected computers before being directed at the target?
PDoS attack
Amplified DRDoS attack
DRDoS attack
DDoS attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Certain checks and balances must also be maintained and defined in the policy measures in detail. Which of the following security policies should be used in this scenario?
An NDA (non-disclosure agreement)
An anti-malware policy
A PUA (privileged user agreement)
An AUP (acceptable use policy)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Kickstart Securities provides network analysis and safety measurement services to various clients. Recently, one of its clients has requested a technician to run a cross-check on the network system to ensure that there are no vulnerabilities that are exposed. You have been sent in to assess the situation and fix the errors if there are any. Which of the following will you use in such a scenario to track the vulnerabilities across systems?
Quid pro quo
Phishing
Zero-day exploit
CVE
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Zeneth Computers is a software development company. It has received a random email claiming that there will be an attempt to hack and extract sensitive financial data of the company before the year end. The company has contacted you, a network analyst, to verify if such claims are indeed true. You have decided to set up a trap for the hackers by putting up a system containing false financial data. Which of the following will you use in this scenario?
Nmap
Nessus
Metasploit
Honeypot
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Pemetaan alamat melalui subneting
Quiz
•
10th Grade
20 questions
Processing- The CPU Quiz
Quiz
•
10th Grade - University
20 questions
Ujian Tengah Semester Ganjil
Quiz
•
9th Grade
20 questions
Browser dan CMS
Quiz
•
7th - 9th Grade
20 questions
Administrasi Sistem jaringan KD1
Quiz
•
1st - 10th Grade
20 questions
Câu hỏi ôn tập GK2
Quiz
•
9th Grade
20 questions
Skill Competition Quiz 2024
Quiz
•
10th Grade - University
20 questions
CSS - Operating System
Quiz
•
11th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
