First_Test_Ver_A

First_Test_Ver_A

Professional Development

14 Qs

quiz-placeholder

Similar activities

INFOSEC WEEK DAY 3

INFOSEC WEEK DAY 3

Professional Development

10 Qs

QUIZ #1 SECURITY+

QUIZ #1 SECURITY+

Professional Development

10 Qs

Evaluación diagnóstica

Evaluación diagnóstica

Professional Development

13 Qs

Barbie Movies

Barbie Movies

KG - Professional Development

15 Qs

IS Quiz

IS Quiz

Professional Development

13 Qs

SOC Live Quiz

SOC Live Quiz

KG - Professional Development

10 Qs

Pokemon

Pokemon

KG - Professional Development

15 Qs

Evaluación Seguridad de la información y Ciberseguridad

Evaluación Seguridad de la información y Ciberseguridad

Professional Development

11 Qs

First_Test_Ver_A

First_Test_Ver_A

Assessment

Quiz

Other

Professional Development

Hard

Created by

steven bair

Used 1+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Charlotte and David are on a mission to protect their critical business application running on a Windows Server 2012. What's the best strategy they should adopt?

Isolation

Segmentation

Hardening

Decommissioning

Answer explanation

Segmentation is the best approach for handling a critical business application on a legacy server, as it isolates the application from other network segments, reducing the risk of vulnerabilities and ensuring better security.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Oh no! A hurricane named Olivia just hit your data center while you were on a tropical vacation. Which of the following plans should Jackson use immediately after the disaster to ensure essential public services keep running smoothly?

BCP

Communication Plan

DRP

IRP

Answer explanation

A cyber security disaster recovery plan after a hurricane should prioritize data protection, system restoration, and secure access control by focusing on pre-storm data backups, offsite storage, secure remote access, damage assessment, and gradual system restoration, all while maintaining heightened vigilance against potential cyber threats that may arise during the recovery process.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Elijah and Noah are on a mission to boost the security defenses of their organization after discovering that sensitive data might be sneaking out of their network. What superhero tool could they use to thwart the data villains and save the day?

XDR

SPF

DLP

DMARC

Answer explanation

(XDR) Extended Detection and Response - gathers threat data from various security tools across an organization's technology stack, allowing for a more unified and efficient way to detect, investigate, and respond to cyber threats

(SPF) Sender Policy Framework - prevent email spoofing and phishing attacks.

(DMARC) Domain-based Message Authentication, Reporting, and Conformance - email security protocol that helps prevent malicious emails. DMARC works by verifying email senders and protecting domains from fraudulent email.

(DLP) Data Loss Prevention - set of tools and strategies designed to detect and prevent the unauthorized access, use, or transmission of sensitive data within an organization, essentially safeguarding against data breaches by monitoring and blocking the movement of critical information like personal details or confidential business data.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

One day, Mason from the sales department decided to set up his own product management software without asking for permission first. What would you call this sneaky move?

Shadow IT

Insider Threat

Data Exfiltration

Service Disruption

Answer explanation

Shadow IT is the use of IT systems, software, or devices without the approval of the IT department. It can include cloud services, hardware, and applications.

Insider Threat is someone with authorized access to the network, who, intentionally or unintentionally uses that access to harm the organization by stealing data, disrupting operations, or compromising sensitive information.

Data Exfiltration is the unauthorized copying, transfer, or retrieval of data from a device or server. It's a type of security breach that can involve personal data, financial records, and intellectual property.

Service Disruption is an event that causes a significant interruption or unavailability of a digital service, preventing users from accessing or utilizing it normally, often due to a cyber attack that overwhelms the system with traffic or compromises its functionality.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Elijah and Mia are diving into the world of network analysis! While examining a PCAP file, they stumble upon protocols like SIP, RTP, and SRTP. What exciting field are these protocols associated with?

RTOS

VoIP

SOC

HVAC

Answer explanation

Voice over Internet Protocol (VoIP) uses a variety of protocols, including Session Initiation Protocol (SIP), Real-time Transport Protocol (RTP), and Secure Real-time Transport Protocol (SRTP)

The most commonly used protocol in HVAC systems is BACnet (Building Automation and Control Network)

(RTOS) Real Time OS and (SOC) Security Operations Center don't really use any specific protocols.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Abigail, your SOC analyst, just informed you about a sneaky new tactic hackers are using to infiltrate networks.

Unfortunately, SIEM alerts haven't been set up yet. What adventurous step will you take to uncover if these tactics have been used against your network?

Digital Forensics

E-Discovery

IR

Threat Hunting

Answer explanation

Digital forensics is the practice of collecting, analyzing, and preserving digital evidence

E-Discovery is a legal process that involves gathering and reviewing electronic information to use as evidence in a legal case

Incident Response is the organized process an organization takes to detect, analyze, contain, and remediate cyber threats or security breaches once they occur, aiming to minimize damage and recover quickly

Threat Hunting is a proactive approach where security professionals actively search through an organization's network and systems to identify potential cyber threats that might have evaded traditional security measures

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Imagine you're launching a new web product called "Luna's Galactic Adventure". Your Chief Information Security Space Officer (CISSO), Michael, has tasked you with ensuring that the product is shielded from cosmic attackers using malformed packets or invalid inputs to destabilize the system. How would you test that Michael's request has been satisfied?

Fuzzing

Continuous Deployment

Static Code Analysis

Manual Peer Review

Answer explanation

Fuzzing is an automated software testing technique where a program is bombarded with random, invalid, or unexpected data inputs to intentionally trigger errors or crashes, thereby identifying potential security vulnerabilities in the software that malicious actors could exploit

Continuous Deployment refers to a software development practice where code changes are automatically pushed to a live production environment after passing automated tests

Static code analysis, also known as static application security testing (SAST), is a method for analyzing code without running it to find security vulnerabilities

Manual Peer Review is the process where a security professional manually examines another colleague's security work, like a penetration test report, security configuration, or code, to identify potential vulnerabilities or weaknesses by carefully reviewing details that might be missed by automated tools

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?