Domains 1-2 Sec+

Domains 1-2 Sec+

12th Grade

25 Qs

quiz-placeholder

Similar activities

1.3.3 Networks

1.3.3 Networks

12th Grade

24 Qs

L3: Understanding Security Policies

L3: Understanding Security Policies

9th - 12th Grade

21 Qs

SQL Quiz

SQL Quiz

12th Grade

20 Qs

MTA - Mobility and Devices Fundamentals Part 1

MTA - Mobility and Devices Fundamentals Part 1

10th Grade - Professional Development

20 Qs

sql queries - 2

sql queries - 2

12th Grade

20 Qs

Domain 1 - Network Security

Domain 1 - Network Security

9th Grade - University

20 Qs

Cyber Fun Password Attack Quiz

Cyber Fun Password Attack Quiz

9th Grade - University

20 Qs

INFO MNGT MIDTERM EXAM P2

INFO MNGT MIDTERM EXAM P2

12th Grade

20 Qs

Domains 1-2 Sec+

Domains 1-2 Sec+

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Krissy Wong

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker at CyberThreat Inc. sends an email with a malicious link that, when clicked, downloads malware onto the victim's system. What type of attack is this?

SQL Injection

Phishing

Man-in-the-middle

Cross-site scripting

Answer explanation

The attack described is phishing, where a hacker sends a malicious link via email to trick the victim into downloading malware. This method exploits social engineering to gain unauthorized access.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an administrative control?

Antivirus software

Security awareness training

Biometric authentication

Intrusion prevention system

Answer explanation

Security awareness training is an administrative control that focuses on educating employees about security policies and practices, helping to mitigate risks through informed behavior. The other options are technical controls.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of threat intelligence provides real-time alerts about current attack trends?

Tactical

Strategic

Operational

Technical

Answer explanation

Tactical threat intelligence focuses on immediate threats and provides real-time alerts about current attack trends, helping organizations respond quickly to emerging threats.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What makes a zero-day vulnerability especially dangerous?

It can only be exploited in specific conditions

It is patched within 24 hours

It has no available fix at the time of discovery

It only affects open-source software

Answer explanation

A zero-day vulnerability is especially dangerous because it has no available fix at the time of discovery, leaving systems exposed to potential attacks until a patch is developed and deployed.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security framework is commonly used for managing risk in U.S. government organizations?

ISO 27001

NIST Cybersecurity Framework

PCI DSS

ITIL

Answer explanation

The NIST Cybersecurity Framework is specifically designed for U.S. government organizations to manage and reduce cybersecurity risk, making it the correct choice over ISO 27001, PCI DSS, and ITIL.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SecureBank Ltd. detects multiple failed login attempts from different IP addresses on an employee account. Which attack is likely occurring?

Phishing

Brute force attack

SQL Injection

DNS Spoofing

Answer explanation

Multiple failed login attempts from different IP addresses suggest a brute force attack, where an attacker tries various passwords to gain unauthorized access. This aligns with the observed behavior.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker at DataSafe Inc. exploits a software bug to gain administrator rights on a system. What type of attack is this?

SQL Injection

Privilege Escalation

Cross-site scripting

Session Hijacking

Answer explanation

The attacker exploits a software bug to gain higher privileges, which is known as privilege escalation. This type of attack allows unauthorized users to gain access to restricted areas of a system.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?