Search Header Logo

Intro to cybersecurity v3

Authored by ziad essam

Computers

University

Used 1+ times

Intro to cybersecurity v3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following tools can be used to provide a list of open ports on network devices?

Nmap

Whois

Ping

Tracert

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

'Today, there are single security appliances that will solve all the network security needs of an organization.'

Is this statement true or false?

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following tools can perform port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?

NetFlow

SIEM

Nmap

Snort

4.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

What is the last stage of a pen test?

Analysis and reporting

Maintaining access

Gathering target information

Scanning

5.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What protocol is used to collect information about traffic traversing a network?

HTTPS

Telnet

NAT

NetFlow

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

'With careful planning and consideration, some risks can be completely eliminated.'

Is this statement true or false?

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?