SEC+ Mod 6 Part 2

SEC+ Mod 6 Part 2

12th Grade

81 Qs

quiz-placeholder

Similar activities

my personal quiz

my personal quiz

9th - 12th Grade

82 Qs

SEC+ Mod 6 Part 5

SEC+ Mod 6 Part 5

12th Grade

82 Qs

TECH Database ALL

TECH Database ALL

9th - 12th Grade

81 Qs

Cybersecurity Units 2-4 Review

Cybersecurity Units 2-4 Review

9th - 12th Grade

85 Qs

Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

80 Qs

CompTIA A+ 1102

CompTIA A+ 1102

9th Grade - Professional Development

77 Qs

ITF+ pt2

ITF+ pt2

9th Grade - Professional Development

85 Qs

networking conceots

networking conceots

8th Grade - University

78 Qs

SEC+ Mod 6 Part 2

SEC+ Mod 6 Part 2

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Pat Johnson

FREE Resource

81 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of data exposure?

Using encrypted HTTP instead of HTTPS

Failing to set up event logs for system activities

Accidentally making a database accessible to the public

Implementing proper logging and monitoring

Answer explanation

Accidentally making a database accessible to the public is an example of data exposure.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is inadequate logging and monitoring?

Failing to implement encryption for data in transit

Not configuring proper logging and monitoring

Making a database accessible to unauthorized users

Using HTTPS for transmitting sensitive data

Answer explanation

Not configuring proper logging and monitoring refers to the lack of setting up systems to track and analyze activities, making it difficult to detect and respond to security incidents effectively.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a consequence of unencrypted data transmission?

Data exposure

Eavesdropping

Proper logging and monitoring

Secure data transmission

Answer explanation

Eavesdropping is a consequence of unencrypted data transmission as it allows unauthorized parties to intercept and listen to the data being transmitted.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a zero-day vulnerability?

A vulnerability known to the software vendor

A vulnerability with public disclosure

A vulnerability unknown to the software vendor or the general public

A vulnerability with low risk

Answer explanation

A zero-day vulnerability is a vulnerability unknown to the software vendor or the general public, making it potentially dangerous due to the lack of available patches or defenses.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of a zero-day vulnerability?

Unknown to vendor

No public disclosure

Low risk

High risk

Answer explanation

The correct choice is 'Low risk' because zero-day vulnerabilities are typically considered high risk due to their unknown nature and lack of public disclosure.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a zero-day vulnerability?

A vulnerability that has been patched by the software vendor.

A vulnerability that is known to the public and has a fix available.

A vulnerability that is unknown to the software vendor and has no patches or updates available.

A vulnerability that is only found in hardware systems.

Answer explanation

A zero-day vulnerability is a vulnerability that is unknown to the software vendor and has no patches or updates available.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of zero-day vulnerabilities?

Unknown to vendor

No public disclosure

Low risk

Time window

Answer explanation

The correct choice is 'Low risk' because zero-day vulnerabilities are typically considered high risk due to their unknown nature and lack of public disclosure.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?