
SEC+ Mod 6 Part 2

Quiz
•
Computers
•
12th Grade
•
Hard
Pat Johnson
FREE Resource
81 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of data exposure?
Using encrypted HTTP instead of HTTPS
Failing to set up event logs for system activities
Accidentally making a database accessible to the public
Implementing proper logging and monitoring
Answer explanation
Accidentally making a database accessible to the public is an example of data exposure.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is inadequate logging and monitoring?
Failing to implement encryption for data in transit
Not configuring proper logging and monitoring
Making a database accessible to unauthorized users
Using HTTPS for transmitting sensitive data
Answer explanation
Not configuring proper logging and monitoring refers to the lack of setting up systems to track and analyze activities, making it difficult to detect and respond to security incidents effectively.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a consequence of unencrypted data transmission?
Data exposure
Eavesdropping
Proper logging and monitoring
Secure data transmission
Answer explanation
Eavesdropping is a consequence of unencrypted data transmission as it allows unauthorized parties to intercept and listen to the data being transmitted.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a zero-day vulnerability?
A vulnerability known to the software vendor
A vulnerability with public disclosure
A vulnerability unknown to the software vendor or the general public
A vulnerability with low risk
Answer explanation
A zero-day vulnerability is a vulnerability unknown to the software vendor or the general public, making it potentially dangerous due to the lack of available patches or defenses.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a characteristic of a zero-day vulnerability?
Unknown to vendor
No public disclosure
Low risk
High risk
Answer explanation
The correct choice is 'Low risk' because zero-day vulnerabilities are typically considered high risk due to their unknown nature and lack of public disclosure.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a zero-day vulnerability?
A vulnerability that has been patched by the software vendor.
A vulnerability that is known to the public and has a fix available.
A vulnerability that is unknown to the software vendor and has no patches or updates available.
A vulnerability that is only found in hardware systems.
Answer explanation
A zero-day vulnerability is a vulnerability that is unknown to the software vendor and has no patches or updates available.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a characteristic of zero-day vulnerabilities?
Unknown to vendor
No public disclosure
Low risk
Time window
Answer explanation
The correct choice is 'Low risk' because zero-day vulnerabilities are typically considered high risk due to their unknown nature and lack of public disclosure.
Create a free account and access millions of resources
Similar Resources on Wayground
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade
19 questions
AP CSP Unit 1 Review (code.org)

Quiz
•
10th - 12th Grade