Sec Review 3

Sec Review 3

University

10 Qs

Student preview

quiz-placeholder

Similar activities

Quiz 1 - Malicious Software

Quiz 1 - Malicious Software

University

14 Qs

CH 12- Defense in Depth

CH 12- Defense in Depth

University

10 Qs

Hacking

Hacking

University

12 Qs

Google Prof Cloud Network - pt 7

Google Prof Cloud Network - pt 7

University

15 Qs

Network Sharing

Network Sharing

7th Grade - University

6 Qs

Net Plus Day 7

Net Plus Day 7

12th Grade - University

10 Qs

ASI 4

ASI 4

University

15 Qs

Network Architecture

Network Architecture

University

14 Qs

Sec Review 3

Sec Review 3

Assessment

Quiz

Created by

Tony Diaz

Computers

University

1 plays

Medium

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which type of security control aims to limit the damage of an attack after it has occurred?

Preventive

Detective

Corrective

Deterrent

2.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

What is non-repudiation primarily concerned with?

Ensuring system uptime

Proving the origin of a message

Ensuring data is not tampered with

Ensuring only authorized personnel access data

3.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which of the following is an asymmetric encryption algorithm?

AES

RSA

Blowfish

Triple DES

4.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Indicators of malicious activity might include all of the following EXCEPT:

Impossible travel

Concurrent session usage

Blocked content

Patching frequency

5.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which of the following threat actors is most likely to be motivated by financial gain?

Nation-state

Hacktivist

Organized crime

Insider threat

6.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

What data classification would be most appropriate for a company’s press releases that get shared openly?

Public

Restricted

Sensitive

Confidential

7.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

In the context of a network’s attack surface, what does device placement primarily influence?

Device power consumption.

Scalability of the network.

Exposure to potential threats.

Responsiveness of microservices.

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?