
SEC+ Mod 6 Part 2
Authored by Pat Johnson
Computers
12th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
81 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of data exposure?
Using encrypted HTTP instead of HTTPS
Failing to set up event logs for system activities
Accidentally making a database accessible to the public
Implementing proper logging and monitoring
Answer explanation
Accidentally making a database accessible to the public is an example of data exposure.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is inadequate logging and monitoring?
Failing to implement encryption for data in transit
Not configuring proper logging and monitoring
Making a database accessible to unauthorized users
Using HTTPS for transmitting sensitive data
Answer explanation
Not configuring proper logging and monitoring refers to the lack of setting up systems to track and analyze activities, making it difficult to detect and respond to security incidents effectively.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a consequence of unencrypted data transmission?
Data exposure
Eavesdropping
Proper logging and monitoring
Secure data transmission
Answer explanation
Eavesdropping is a consequence of unencrypted data transmission as it allows unauthorized parties to intercept and listen to the data being transmitted.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a zero-day vulnerability?
A vulnerability known to the software vendor
A vulnerability with public disclosure
A vulnerability unknown to the software vendor or the general public
A vulnerability with low risk
Answer explanation
A zero-day vulnerability is a vulnerability unknown to the software vendor or the general public, making it potentially dangerous due to the lack of available patches or defenses.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a characteristic of a zero-day vulnerability?
Unknown to vendor
No public disclosure
Low risk
High risk
Answer explanation
The correct choice is 'Low risk' because zero-day vulnerabilities are typically considered high risk due to their unknown nature and lack of public disclosure.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a zero-day vulnerability?
A vulnerability that has been patched by the software vendor.
A vulnerability that is known to the public and has a fix available.
A vulnerability that is unknown to the software vendor and has no patches or updates available.
A vulnerability that is only found in hardware systems.
Answer explanation
A zero-day vulnerability is a vulnerability that is unknown to the software vendor and has no patches or updates available.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a characteristic of zero-day vulnerabilities?
Unknown to vendor
No public disclosure
Low risk
Time window
Answer explanation
The correct choice is 'Low risk' because zero-day vulnerabilities are typically considered high risk due to their unknown nature and lack of public disclosure.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?