PRE TEST FORUM OKI

PRE TEST FORUM OKI

Professional Development

20 Qs

quiz-placeholder

Similar activities

Cyber Security Quiz ( IMPOSSIBLE )

Cyber Security Quiz ( IMPOSSIBLE )

Professional Development

15 Qs

SAN Module 5 Quiz

SAN Module 5 Quiz

University - Professional Development

15 Qs

Part 2.3

Part 2.3

Professional Development

20 Qs

ITF+ Ch10, Security Best Practices

ITF+ Ch10, Security Best Practices

Professional Development

20 Qs

R&D Days

R&D Days

Professional Development

15 Qs

Protecting Host Systems

Protecting Host Systems

11th Grade - Professional Development

16 Qs

Level 5 - OSP Quiz

Level 5 - OSP Quiz

Professional Development

15 Qs

Chapter 1 and 2 Quiz

Chapter 1 and 2 Quiz

Professional Development

20 Qs

PRE TEST FORUM OKI

PRE TEST FORUM OKI

Assessment

Quiz

Computers

Professional Development

Hard

Created by

tukang tagih

FREE Resource

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 5 pts

Which of the following concepts are included on the three sides of the "security triangle"? (Select THREE).

Confidentiality

Availability

Integrity

Continuity

Authentication

Answer explanation

The concepts included on the three sides of the 'security triangle' are Confidentiality, Availability, and Integrity.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What type of attack involves sending a fake link to multiple users in order to obtain sensitive information?

Phishing

Ransomware

SQL Injection

Spoofing

Answer explanation

Phishing involves sending fake links to obtain sensitive information from multiple users, making it the correct choice for this type of attack.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which attack type involves receiving an automated phone call from a seemingly legitimate source to extract credit card information?

Smishing

Hoax

Vishing

Spoofing

Answer explanation

Vishing involves receiving an automated phone call from a seemingly legitimate source to extract credit card information.

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What asset is commonly targeted for Data Loss Prevention (DLP) purposes?

Application server content

USB mass storage devices

Reverse proxy

Print server

Answer explanation

USB mass storage devices are commonly targeted for Data Loss Prevention (DLP) purposes due to the risk of data leakage through portable storage devices.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A hacker has discovered a simple way to disrupt business for the day in a small company which relies on staff working remotely. In a matter of minutes the hacker was able to deny remotely working staff access to company systems with a script. Which of the following security controls is the hacker exploiting?

DoS

Account lockout

Password recovery

Password complexity

Answer explanation

The hacker is exploiting the account lockout security control by denying remotely working staff access to company systems with a script.

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A user ID and password together provide which of the following?

Authorization

Validation

Encryption

Authentication

Answer explanation

A user ID and password together provide Authentication, which verifies the identity of the user trying to access a system or application.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Pete, an employee, attempts to visit a popular social networking site but is blocked. Instead, a page is displayed notifying him that this site cannot be visited. Which of the following is MOST likely blocking Pete's access to this site?

Internet content filter

Firewall

Proxy server

Protocol analyzer

Answer explanation

Pete is most likely blocked by an Internet content filter, which restricts access to certain websites based on content categories.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?