Intro to cybersecurity v3

Intro to cybersecurity v3

University

6 Qs

quiz-placeholder

Similar activities

T2 System Unit

T2 System Unit

12th Grade - University

10 Qs

Software engineering

Software engineering

University

10 Qs

Network devices

Network devices

University

10 Qs

2 - SEGURIDAD EN REDES

2 - SEGURIDAD EN REDES

University

10 Qs

Module 11: Switch Security Configuration

Module 11: Switch Security Configuration

University

10 Qs

Network Basic

Network Basic

University

10 Qs

Nmap Scan Quiz

Nmap Scan Quiz

University

10 Qs

Network+ Computer Network Fundamentals

Network+ Computer Network Fundamentals

University

10 Qs

Intro to cybersecurity v3

Intro to cybersecurity v3

Assessment

Quiz

Computers

University

Hard

Created by

ziad essam

Used 1+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following tools can be used to provide a list of open ports on network devices?

Nmap

Whois

Ping

Tracert

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

'Today, there are single security appliances that will solve all the network security needs of an organization.'

Is this statement true or false?

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following tools can perform port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?

NetFlow

SIEM

Nmap

Snort

4.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

What is the last stage of a pen test?

Analysis and reporting

Maintaining access

Gathering target information

Scanning

5.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What protocol is used to collect information about traffic traversing a network?

HTTPS

Telnet

NAT

NetFlow

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

'With careful planning and consideration, some risks can be completely eliminated.'

Is this statement true or false?

True

False