Cybersecurity Practice

Cybersecurity Practice

11th Grade

25 Qs

quiz-placeholder

Similar activities

Ulangan Harian Jaringan Komputer dan Internet XI

Ulangan Harian Jaringan Komputer dan Internet XI

11th Grade

20 Qs

Grafika komputerowa

Grafika komputerowa

10th Grade - University

22 Qs

Image editing

Image editing

4th Grade - University

20 Qs

KISI SOAL PTS AIJ TKJ XI

KISI SOAL PTS AIJ TKJ XI

11th Grade

20 Qs

INFORMATIKA KLS 9

INFORMATIKA KLS 9

9th Grade - University

20 Qs

Web 1.5-1.6 Bacaan

Web 1.5-1.6 Bacaan

11th Grade

20 Qs

LT6 HK1

LT6 HK1

6th Grade - University

20 Qs

TJAT--SK,Elektronika & Mikroprosesor

TJAT--SK,Elektronika & Mikroprosesor

11th Grade

20 Qs

Cybersecurity Practice

Cybersecurity Practice

Assessment

Quiz

Information Technology (IT)

11th Grade

Practice Problem

Easy

Created by

CISCO CERTIFICATIONS

Used 23+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A threat actor sets up a rogue access point (AP) at a local cafe. The rogue AP captures traffic and then forwards the traffic to the cafe AP. Which type of attack does this scenario describe?

Ransomware

DDos

Man-in-the Middle

Reconnaissance

Answer explanation

This scenario describes a Man-in-the-Middle attack, where the rogue access point intercepts and relays traffic between the user and the legitimate access point, allowing the attacker to capture sensitive information.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You notice that a new CVE has been shared to an email group that you belong to. What should you do first with the CVE?

Record the CVE as part of the disaster recovery plan

Look up the details of the vulnerability to determine whether it applies to your network

Add the CVE to the firewall rules for your organization

Research measures to prevent the CVE from attacking the network

Answer explanation

The first step is to look up the details of the CVE to assess its relevance to your network. Understanding the vulnerability helps determine the appropriate response and mitigation measures.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which password follows strong password policy guidelines?

Snuffy#

1mpressive1

Mar221984

Wh@tareyouDo1ngtoday4

Answer explanation

The password 'Wh@tareyouDo1ngtoday4' is strong because it includes a mix of uppercase and lowercase letters, numbers, and special characters, making it complex. The other options lack sufficient complexity or length.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your supervisor tells you that you will participate in a CVSS assessment. What will you be doing?

Interviewing users to determine their level of cybersecurity awareness

Analyzing host logs to identify abnormal activities

Evaluating end system security and scoring vulverabilities

Performing penetration tests on internal network devices and systems

Answer explanation

In a CVSS assessment, you will evaluate end system security and score vulnerabilities to determine their severity and impact, which is essential for prioritizing remediation efforts.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How do threat actors launch ransomware attacks on organizations?

They implant malware to collect data from the corporation's financial system

They deface an organization's public facing website

They secretly spy on employees and collect their personal information

They lock data and deny access until they receive money

Answer explanation

Ransomware attacks involve locking data and denying access until a ransom is paid. This method directly targets an organization's ability to operate, making it a primary tactic for threat actors.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The company web server collect information through a form. The form is accessed by using port 80. The form content is transferred to an encrypted database for storage. You are investigating a complaint that the form content has been compromised..

What is the cause of the security breach?

The data was transferred to the database using a nonsecure protocol

The database was compromised

The content was accessed using HTTP, which is an unencrypted protocol

The web browser used to access the site wasnot updated to the latest version

Answer explanation

The correct choice is that the content was accessed using HTTP, which is an unencrypted protocol. This means that data transmitted over port 80 is vulnerable to interception, leading to potential compromise.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which Windows app is a command-line interface that includes a sophisticated scripting language used to automate Windows tasks?

VMware

Microsoft Management Console

MS-DOS

Powershell

Answer explanation

Powershell is a command-line interface specifically designed for Windows, featuring a powerful scripting language that allows users to automate various tasks efficiently, making it the correct choice.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?