
Security test 2
Quiz
•
Instructional Technology
•
12th Grade
•
Hard
Keegan Yap
Used 1+ times
FREE Resource
Enhance your content in a minute
85 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security administrator has performed an audit of the
organization’s production web servers, and the results
have identified banner information leakage, web services
running from a privileged account, and inconsistencies
with SSL certificates. Which of the following would be
the BEST way to resolve these issues?
Server hardening
Multi-factor authentication
Enable HTTPS
Run operating system updates
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A shipping company stores information in small regional
warehouses around the country. The company keeps an
IPS online at each warehouse to watch for suspicious
traffic patterns. Which of the following would BEST
describe the security control used at the warehouse?
Managerial
Compensating
Physical
Detective
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Vice President of Sales has asked the IT team to
create daily backups of the sales data. The Vice President
is an example of a:
Data owner
Data protection officer
Data steward
Data processor
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security engineer is preparing to conduct a penetration
test. Part of the preparation involves reading through
social media posts for information about a third-party
website. Which of the following describes this practice?
Partially known environment
OSINT
Exfiltration
Active footprinting
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company would like to automate their response when
a virus is detected on company devices. Which of the
following would be the BEST way to implement
this function?
Active footprinting
IaaS
Vulnerability scan
SOAR
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user in the accounting department has received an
email from the CEO requesting payment for a recently
purchased tablet. However, there doesn't appear to be a
purchase order associated with this request. Which of the
following would be the MOST likely attack associated
with this email?
Spear phishing
Watering hole attack
Invoice scam
Credential harvesting
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company has been informed of a hypervisor
vulnerability that could allow users on one virtual
machine to access resources on another virtual machine.
Which of the following would BEST describe this
vulnerability?
Containerization
Service integration
SDN
VM escape
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Instructional Technology
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
15 questions
Christmas Song Emoji Pictionary
Quiz
•
7th - 12th Grade
20 questions
Christmas Movies
Quiz
•
1st - 12th Grade
55 questions
CHS Holiday Trivia
Quiz
•
12th Grade
20 questions
Christmas Movie Trivia
Quiz
•
9th - 12th Grade
29 questions
christmas facts
Lesson
•
5th - 12th Grade
20 questions
Christmas Trivia
Quiz
•
5th - 12th Grade
20 questions
Stages of Meiosis
Quiz
•
9th - 12th Grade
