
security test
Quiz
•
Instructional Technology
•
12th Grade
•
Hard
Keegan Yap
Used 4+ times
FREE Resource
Enhance your content in a minute
85 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You’ve hired a third-party to gather information about
your company’s servers and data. The third-party will not
have direct access to your internal network but can gather
information from any other source.
Which of the following would BEST describe this
approach?
Backdoor testing
Passive footprinting
OS fingerprinting
Partially known environment
Answer explanation
2.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which of these protocols use TLS to provide secure
communication? (Select TWO)
HTTPS
SSH
FTPS
SNMPv2
DNSSEC
Answer explanation
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of these threat actors would be MOST likely to
attack systems for direct financial gain?
Organized crime
Hacktivist
Nation state
Competitor
Answer explanation
4.
MULTIPLE SELECT QUESTION
1 min • 1 pt
A security incident has occurred on a file server. Which of
the following data sources should be gathered to address
file storage volatility? (Select TWO)
Partition data
Kernel statistics
ROM data
Temporary file systems
Answer explanation
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An IPS at your company has found a sharp increase
in traffic from all-in-one printers. After researching,
your security team has found a vulnerability associated
with these devices that allows the device to be remotely
controlled by a third-party. Which category would BEST
describe these devices?
IoT
RTOS
MFD
SoC
Answer explanation
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following standards provides information
on privacy and managing PII?
ISO 31000
ISO 27002
ISO 27701
ISO 27001
Answer explanation
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Elizabeth, a security administrator, is concerned about
the potential for data exfiltration using external storage
drives. Which of the following would be the BEST way
to prevent this method of data exfiltration?
Create an operating system security policy to
prevent the use of removable media
Monitor removable media usage in host-based
firewall logs
Only allow applications that do not use
removable media
Define a removable media block rule in the UTM
Answer explanation
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Instructional Technology
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
15 questions
Christmas Song Emoji Pictionary
Quiz
•
7th - 12th Grade
20 questions
Christmas Movies
Quiz
•
1st - 12th Grade
55 questions
CHS Holiday Trivia
Quiz
•
12th Grade
20 questions
Christmas Movie Trivia
Quiz
•
9th - 12th Grade
29 questions
christmas facts
Lesson
•
5th - 12th Grade
20 questions
Christmas Trivia
Quiz
•
5th - 12th Grade
20 questions
Stages of Meiosis
Quiz
•
9th - 12th Grade
