
PART 1
Authored by Ayomide Oluwaga
Computers
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
54 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these attacks take advantage of inadequate input validation in websites?
Phishing
Trojans
Cross-Site Scripting
Rootkits
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization needs a network security tool that detects and acts in the event of malicious activity. Which of these tools will BEST meet their needs?
Router
IPS
IDS
Firewall
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a DAC policy scenario, which of these tasks can only be performed by a subject granted access to information?
Changing security attributes
Reading the information
Executing the information
Modifying the information
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the event of non-compliance, which of these can have considerable financial consequences for an organization?
Policies
Regulations
Guidelines
Standards
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term LAN refer to?
A tool to manage and control network traffic, as well as to protect a network.
A network on a building or limited geographical area
A device that connects multiple other devices in a network
A long-distance connection between geographically-distant networks
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is a type of corrective security control?
Patches
Intrusion detection systems
Guidelines
Encryption
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these enables point-to-point online communication over an untrusted network?
VLAN
Firewall
Router
VPN
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?