Sec Review 5

Sec Review 5

University

10 Qs

quiz-placeholder

Similar activities

Server Administration- Quiz 1

Server Administration- Quiz 1

12th Grade - University

10 Qs

Computer Science (1-9) - Identifying & Preventing Threats

Computer Science (1-9) - Identifying & Preventing Threats

University

11 Qs

Recording Software Button Identification Quiz

Recording Software Button Identification Quiz

8th Grade - University

10 Qs

Quiz Informatica Jornadas Orientación Asunción

Quiz Informatica Jornadas Orientación Asunción

12th Grade - University

10 Qs

Round 2 for Preplacement Bootcamp

Round 2 for Preplacement Bootcamp

University

15 Qs

Argumentación

Argumentación

University

15 Qs

Internet

Internet

University

11 Qs

Cha-ching 2

Cha-ching 2

1st Grade - University

8 Qs

Sec Review 5

Sec Review 5

Assessment

Quiz

Computers

University

Easy

Created by

Tony Diaz

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

An administrator notices a sudden spike in system resource consumption, especially bandwidth, with no obvious reason. What might this indicate?

An impending hardware failure

A scheduled backup process

An ongoing DDoS attack

Regular software updates

2.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which of the following is NOT a mitigation technique used to secure an enterprise?

Hardening techniques

Side loading

Access control

Least privilege

3.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

A type of malware that holds user data hostage by encrypting it and demanding payment for the decryption key is known as:

Logic bomb

Ransomware

Worm

Spyware

4.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

A company needs a solution to ensure its remote workers can securely access the corporate network. Which of the following is best suited for this purpose?

Virtual private network (VPN)

Load balancer

Intrusion prevention system (IPS)

Software-defined wide area network (SD-WAN)

5.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which wireless security protocol provides the strongest encryption and security capabilities as of the most recent standards?

WEP.

WPA.

Open authentication.

WPA3.

6.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

A user has been given temporary elevated access to a database for a specific task. Which concept best describes this kind of permission granting?

Multifactor authentication

Just-in-time permissions

Role-based access control

Discretionary access control

7.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

During a penetration test, an attacker has no prior knowledge of the network infrastructure. Which type of testing environment does this represent?

Known environment

Unknown environment

Integrated environment

Partially known environment

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?