Cisco 1

Cisco 1

Professional Development

11 Qs

quiz-placeholder

Similar activities

Quiz 84 Civil express

Quiz 84 Civil express

Professional Development

10 Qs

Zooba

Zooba

KG - Professional Development

14 Qs

M8.3 Aerodynamics Forces Relationship

M8.3 Aerodynamics Forces Relationship

Professional Development

10 Qs

PoF Chapter 6 Drag

PoF Chapter 6 Drag

Professional Development

15 Qs

all about johnson and victory <3

all about johnson and victory <3

1st Grade - Professional Development

12 Qs

Bernoulli Principle

Bernoulli Principle

Professional Development

10 Qs

Aerodynamics Quiz

Aerodynamics Quiz

Professional Development

10 Qs

M8.3 Steady-state flight

M8.3 Steady-state flight

Professional Development

10 Qs

Cisco 1

Cisco 1

Assessment

Quiz

Physics

Professional Development

Hard

Created by

Roger White

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term vulnerability mean?

a potential threat that a hacker creates

a weakness that makes a target susceptible to an attack

a method of attack to exploit a target


a known target or victim machine

a computer that contains sensitive information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The employees in a company receive an email stating that the account password will expire immediately and requires a password reset within 5 minutes. Which statement would classify this email?

It is a piggy-back attack.


It is a hoax.

It is an impersonation attack.


It is a DDoS attack.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What three best practices can help defend against social engineering attacks? (Choose three.)

Do not provide password resets in a chat window.

Deploy well-designed firewall appliances.

Enable a policy that states that the IT department should supply information over the phone only to managers.

Educate employees regarding policies.


Resist the urge to click on enticing web links.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cyber criminal sends a series of maliciously formatted packets to the database server. The server cannot parse the packets and the event causes the server to crash. What is the type of attack the cyber criminal launches?


SQL injection

DoS

packet Injection

man-in-the-middle

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security service company is conducting an audit in several risk areas within a major corporate client. What attack or data loss vector term would be used to describe providing access to corporate data by gaining access to stolen or weak passwords?

improper access control

hard copy

an internal threat


unencrypted devices

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A social media site is describing a security breach in a sensitive branch of a national bank. In the post, it refers to a vulnerability. What statement describes that term?

A weakness in a system or its design that could be exploited by a threat.


The actions that are taken to protect assets by mitigating a threat or reducing risk.

The potential damage to the organization that is caused by the threat.

The likelihood that a particular threat will exploit a vulnerability of an asset and result in an undesirable consequence.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first line of defense to protect a device from improper access control?

passwords


end user license agreement (EULA)

shredding

encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?