24-25 Module 8 Period 7-8 Group 2

24-25 Module 8 Period 7-8 Group 2

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Crystal Lufafa

Used 2+ times

FREE Resource

Student preview

quiz-placeholder

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Matthew Bui wants to monitor his network activity so he installs monitoring software. He typically goes to bed early because he has school in the morning. But its the weekend so he decides to stay up and stay on discord with mitchell. He gets an email alert from his networking equipment, what could've caused this?

Heuristic Monitoring

Wire shark

Anomaly Monitoring

Behavioral Monitoring

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is true of SOAR and SIEM

SOAR traps used to manage and monitor network equipment, SIEM its set of standards

SOAR helps security teams manage and respond to very high warnings and alarms SIEM, collects data from different sources to look for threats

SIEM Monitors the networks different devices and sounds an alert if it exceeds a baseline, SOAR disables separate software monitoring agents

SIEM Manages network equipment, SOAR collects network traffic that enters and interface

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is the correct description of SCAP?

SCAP is a system that helps protect sensitive data it monitors how data is being used  and accessed and alerts admin

SCAP is a set of standards that can be used to automate vulnerability management and appliance checks.

SCAP is a set of guidelines for manually reviewing security policies in an organization

SCAP allows you to capture and analyze network traffic

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

The GoldenState banks system abruptly shuts down,Steph curry is furious , and employees are unable to access files. A message is displayed demanding Bitcoin for data recovery. IT teams use flow analysis to find unusual traffic spikes, rapid file encryption, and unknown server connections.

DDoS Attack

Phishing Attack

MITM

Ransomeware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what are the primary purposes of Data loss prevention?

monitors and controls data transfer, prevents unauthorized access from being leaked/stolen

monitors and manages businesses security, collecting data from different sources to look for threats

to create backups of all company data in case of system failure

looks for specific patterns in the  network traffic that are known to be associated with malicious activity