Security test 2

Security test 2

12th Grade

85 Qs

quiz-placeholder

Similar activities

security test

security test

SEC+Practice Quiz B6-B26

SEC+Practice Quiz B6-B26

Cyber Security Test

Cyber Security Test

Security test 3

Security test 3

Cybersecurity Quiz

Cybersecurity Quiz

Introduction to Cybersecurity Final Exam Units 1-8

Introduction to Cybersecurity Final Exam Units 1-8

Comptia Sec plus part 3

Comptia Sec plus part 3

Security test 2

Security test 2

Assessment

Quiz

Instructional Technology

12th Grade

Hard

Created by

Keegan Yap

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

85 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator has performed an audit of the

organization’s production web servers, and the results

have identified banner information leakage, web services

running from a privileged account, and inconsistencies

with SSL certificates. Which of the following would be

the BEST way to resolve these issues?

Server hardening

Multi-factor authentication

Enable HTTPS

Run operating system updates

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A shipping company stores information in small regional

warehouses around the country. The company keeps an

IPS online at each warehouse to watch for suspicious

traffic patterns. Which of the following would BEST

describe the security control used at the warehouse?

Managerial

Compensating

Physical

Detective

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Vice President of Sales has asked the IT team to

create daily backups of the sales data. The Vice President

is an example of a:

Data owner

Data protection officer

Data steward

Data processor

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security engineer is preparing to conduct a penetration

test. Part of the preparation involves reading through

social media posts for information about a third-party

website. Which of the following describes this practice?

Partially known environment

OSINT

Exfiltration

Active footprinting

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company would like to automate their response when

a virus is detected on company devices. Which of the

following would be the BEST way to implement

this function?

Active footprinting

IaaS

Vulnerability scan

SOAR

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user in the accounting department has received an

email from the CEO requesting payment for a recently

purchased tablet. However, there doesn't appear to be a

purchase order associated with this request. Which of the

following would be the MOST likely attack associated

with this email?

Spear phishing

Watering hole attack

Invoice scam

Credential harvesting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company has been informed of a hypervisor

vulnerability that could allow users on one virtual

machine to access resources on another virtual machine.

Which of the following would BEST describe this

vulnerability?

Containerization

Service integration

SDN

VM escape

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?