Chapter 22.4 Quiz

Chapter 22.4 Quiz

12th Grade

15 Qs

quiz-placeholder

Similar activities

Unit 11 Assessing Vulnerabilities

Unit 11 Assessing Vulnerabilities

12th Grade

20 Qs

Internet security

Internet security

11th - 12th Grade

10 Qs

 Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

Sandbox

Sandbox

12th Grade

15 Qs

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

12th Grade

10 Qs

Cybersecurity 2 Chapter 1 Quiz

Cybersecurity 2 Chapter 1 Quiz

9th - 12th Grade

10 Qs

039_Zero-day Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

039_Zero-day Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

9th - 12th Grade

20 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Chapter 22.4 Quiz

Chapter 22.4 Quiz

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Ann Watterson

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a component of the attack surface described by the SANS Institute?

Network Attack Surface

Software Attack Surface

Human Attack Surface

Physical Attack Surface

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Network Attack Surface?

Exploitation of vulnerabilities in user behavior

Exploitation of vulnerabilities in networks

Exploitation of vulnerabilities in software applications

Exploitation of vulnerabilities in physical devices

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Human Attack Surface?

Exploitation of vulnerabilities in user behavior

Exploitation of vulnerabilities in networks

Exploitation of vulnerabilities in software applications

Exploitation of vulnerabilities in physical devices

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is block listing?

Allowing all applications to run

Creating lists of prohibited applications

Ignoring security threats

Increasing the attack surface

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How are allow lists created?

Randomly by users

In accordance with a security baseline

By ignoring security threats

By increasing the attack surface

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can violate the established security baseline?

Allow listed software

Non-allow listed software

Block listed software

All software

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the Firepower security management system?

To execute malware

To access the Cisco Talos security intelligence service

To create malware

To disable security devices

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers