24-25 Module 8 Period 7-8 Group 2
Quiz
•
Computers
•
12th Grade
•
Hard
Crystal Lufafa
Used 2+ times
FREE Resource
Student preview

5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Matthew Bui wants to monitor his network activity so he installs monitoring software. He typically goes to bed early because he has school in the morning. But its the weekend so he decides to stay up and stay on discord with mitchell. He gets an email alert from his networking equipment, what could've caused this?
Heuristic Monitoring
Wire shark
Anomaly Monitoring
Behavioral Monitoring
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is true of SOAR and SIEM
SOAR traps used to manage and monitor network equipment, SIEM its set of standards
SOAR helps security teams manage and respond to very high warnings and alarms SIEM, collects data from different sources to look for threats
SIEM Monitors the networks different devices and sounds an alert if it exceeds a baseline, SOAR disables separate software monitoring agents
SIEM Manages network equipment, SOAR collects network traffic that enters and interface
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following is the correct description of SCAP?
SCAP is a system that helps protect sensitive data it monitors how data is being used and accessed and alerts admin
SCAP is a set of standards that can be used to automate vulnerability management and appliance checks.
SCAP is a set of guidelines for manually reviewing security policies in an organization
SCAP allows you to capture and analyze network traffic
4.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
The GoldenState banks system abruptly shuts down,Steph curry is furious , and employees are unable to access files. A message is displayed demanding Bitcoin for data recovery. IT teams use flow analysis to find unusual traffic spikes, rapid file encryption, and unknown server connections.
DDoS Attack
Phishing Attack
MITM
Ransomeware
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
what are the primary purposes of Data loss prevention?
monitors and controls data transfer, prevents unauthorized access from being leaked/stolen
monitors and manages businesses security, collecting data from different sources to look for threats
to create backups of all company data in case of system failure
looks for specific patterns in the network traffic that are known to be associated with malicious activity
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Computers
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
15 questions
Christmas Song Emoji Pictionary
Quiz
•
7th - 12th Grade
20 questions
Christmas Movies
Quiz
•
1st - 12th Grade
55 questions
CHS Holiday Trivia
Quiz
•
12th Grade
20 questions
Christmas Movie Trivia
Quiz
•
9th - 12th Grade
29 questions
christmas facts
Lesson
•
5th - 12th Grade
20 questions
Christmas Trivia
Quiz
•
5th - 12th Grade
20 questions
Stages of Meiosis
Quiz
•
9th - 12th Grade