AP CK CyberSecurity Unit 4

AP CK CyberSecurity Unit 4

12th Grade

10 Qs

quiz-placeholder

Similar activities

Grade 6 - Living with AI

Grade 6 - Living with AI

6th Grade - University

15 Qs

ROBÓTICA/CONCEPTOS DUODÉCIMO A

ROBÓTICA/CONCEPTOS DUODÉCIMO A

12th Grade

10 Qs

Quiz on Personalized Learning

Quiz on Personalized Learning

12th Grade - University

10 Qs

Python Gaming L3

Python Gaming L3

9th - 12th Grade

10 Qs

Typing Skills and Digital Literacy Assessment

Typing Skills and Digital Literacy Assessment

12th Grade - University

15 Qs

Quiz VOIP & KJ

Quiz VOIP & KJ

12th Grade

15 Qs

LibreOffice Writer Styles Quiz

LibreOffice Writer Styles Quiz

10th Grade - University

15 Qs

Literasi DIgital Part II

Literasi DIgital Part II

12th Grade

11 Qs

AP CK CyberSecurity Unit 4

AP CK CyberSecurity Unit 4

Assessment

Quiz

Information Technology (IT)

12th Grade

Easy

Created by

Kristina Rice

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What security tool is being used to protect this network?

  • Collects data streams from multiple sources

  • Analyzes the data to detect patterns that may indicate a cyber attack

  • Raises an alert if a potential attack is detected

  • Security analysts investigate the alert to determine whether it represents a true threat

What security tool is being used to protect this network?

Network intrusion prevention system (NIPS)

Next-generation firewall (NGFW)

Web application firewall (WAF)

Security incident and event management (SIEM)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following methods is used to detect cyber attacks that are known and have been previously recorded?

Anomaly-based detection

Signature-based detection

Baselining detection

Hybrid detection

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During the reconnaissance phase of a cyber attack, an adversary was able to learn the following about a target:

A social media website revealed the target’s employer

The employer’s website revealed the office address

A public records website revealed the target’s home address

Which of the following resources did the adversary use to obtain this information?

Phishing

APT

Wiretapping

OSINT

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of shoulder surfing?

An adversary uses software that tracks all the keys a target presses on their keyboard

An adversary sets up a fake Wi-Fi hotspot to collect login credentials when users connect

An adversary steals a laptop that is left unattended in a coffee shop

An adversary watches a target enter their phone’s passcode

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can be added to a password to prevent users with the same passwords from having the same password hash?

A second hashing algorithm

A token

A key derivation function

A salt

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A system administrator is reviewing the following authentication log. What might the anomaly on line 9 indicate?

The user’s password has been compromised

The system’s clock has reset on the network

The user logged in during a maintenance window

The user has accessed a restricted area

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following explains how a SQL injection attack can exploit an application?

It places SQL commands into a user-input field in an application with the intent to either return more information than it should or modify the data on the database

It places malicious JavaScript code into a SQL user-input field to steal user session cookies with the intent to use these cookies to gain authentication to the application

It uses the user-input field of the application to bypass user authentication requirements for the application to gain access to the application

It uses a user-input field in an application to send an overwhelming amount of data to the application in hopes to cause a denial of service attack on the application

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?