SEC+ Mod 6 Part 2

SEC+ Mod 6 Part 2

12th Grade

81 Qs

quiz-placeholder

Similar activities

Systemy operacyjne 2

Systemy operacyjne 2

12th Grade

76 Qs

Chapter 18 - 21 Video Game Programming

Chapter 18 - 21 Video Game Programming

9th - 12th Grade

80 Qs

Animation Semester Review

Animation Semester Review

9th - 12th Grade

85 Qs

CS 241 Practice Test Week 4

CS 241 Practice Test Week 4

9th Grade - University

86 Qs

BLUE PRISM_SET-1

BLUE PRISM_SET-1

12th Grade

83 Qs

ITF+ pt2

ITF+ pt2

9th Grade - Professional Development

85 Qs

Conversion Bin Oct Hex

Conversion Bin Oct Hex

9th - 12th Grade

80 Qs

Web e HTML

Web e HTML

12th Grade

80 Qs

SEC+ Mod 6 Part 2

SEC+ Mod 6 Part 2

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Pat Johnson

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

81 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of data exposure?

Using encrypted HTTP instead of HTTPS

Failing to set up event logs for system activities

Accidentally making a database accessible to the public

Implementing proper logging and monitoring

Answer explanation

Accidentally making a database accessible to the public is an example of data exposure.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is inadequate logging and monitoring?

Failing to implement encryption for data in transit

Not configuring proper logging and monitoring

Making a database accessible to unauthorized users

Using HTTPS for transmitting sensitive data

Answer explanation

Not configuring proper logging and monitoring refers to the lack of setting up systems to track and analyze activities, making it difficult to detect and respond to security incidents effectively.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a consequence of unencrypted data transmission?

Data exposure

Eavesdropping

Proper logging and monitoring

Secure data transmission

Answer explanation

Eavesdropping is a consequence of unencrypted data transmission as it allows unauthorized parties to intercept and listen to the data being transmitted.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a zero-day vulnerability?

A vulnerability known to the software vendor

A vulnerability with public disclosure

A vulnerability unknown to the software vendor or the general public

A vulnerability with low risk

Answer explanation

A zero-day vulnerability is a vulnerability unknown to the software vendor or the general public, making it potentially dangerous due to the lack of available patches or defenses.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of a zero-day vulnerability?

Unknown to vendor

No public disclosure

Low risk

High risk

Answer explanation

The correct choice is 'Low risk' because zero-day vulnerabilities are typically considered high risk due to their unknown nature and lack of public disclosure.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a zero-day vulnerability?

A vulnerability that has been patched by the software vendor.

A vulnerability that is known to the public and has a fix available.

A vulnerability that is unknown to the software vendor and has no patches or updates available.

A vulnerability that is only found in hardware systems.

Answer explanation

A zero-day vulnerability is a vulnerability that is unknown to the software vendor and has no patches or updates available.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of zero-day vulnerabilities?

Unknown to vendor

No public disclosure

Low risk

Time window

Answer explanation

The correct choice is 'Low risk' because zero-day vulnerabilities are typically considered high risk due to their unknown nature and lack of public disclosure.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers