
Cybersecurity Practice

Quiz
•
Information Technology (IT)
•
11th Grade
•
Easy
CISCO CERTIFICATIONS
Used 23+ times
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A threat actor sets up a rogue access point (AP) at a local cafe. The rogue AP captures traffic and then forwards the traffic to the cafe AP. Which type of attack does this scenario describe?
Ransomware
DDos
Man-in-the Middle
Reconnaissance
Answer explanation
This scenario describes a Man-in-the-Middle attack, where the rogue access point intercepts and relays traffic between the user and the legitimate access point, allowing the attacker to capture sensitive information.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You notice that a new CVE has been shared to an email group that you belong to. What should you do first with the CVE?
Record the CVE as part of the disaster recovery plan
Look up the details of the vulnerability to determine whether it applies to your network
Add the CVE to the firewall rules for your organization
Research measures to prevent the CVE from attacking the network
Answer explanation
The first step is to look up the details of the CVE to assess its relevance to your network. Understanding the vulnerability helps determine the appropriate response and mitigation measures.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which password follows strong password policy guidelines?
Snuffy#
1mpressive1
Mar221984
Wh@tareyouDo1ngtoday4
Answer explanation
The password 'Wh@tareyouDo1ngtoday4' is strong because it includes a mix of uppercase and lowercase letters, numbers, and special characters, making it complex. The other options lack sufficient complexity or length.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Your supervisor tells you that you will participate in a CVSS assessment. What will you be doing?
Interviewing users to determine their level of cybersecurity awareness
Analyzing host logs to identify abnormal activities
Evaluating end system security and scoring vulverabilities
Performing penetration tests on internal network devices and systems
Answer explanation
In a CVSS assessment, you will evaluate end system security and score vulnerabilities to determine their severity and impact, which is essential for prioritizing remediation efforts.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
How do threat actors launch ransomware attacks on organizations?
They implant malware to collect data from the corporation's financial system
They deface an organization's public facing website
They secretly spy on employees and collect their personal information
They lock data and deny access until they receive money
Answer explanation
Ransomware attacks involve locking data and denying access until a ransom is paid. This method directly targets an organization's ability to operate, making it a primary tactic for threat actors.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The company web server collect information through a form. The form is accessed by using port 80. The form content is transferred to an encrypted database for storage. You are investigating a complaint that the form content has been compromised..
What is the cause of the security breach?
The data was transferred to the database using a nonsecure protocol
The database was compromised
The content was accessed using HTTP, which is an unencrypted protocol
The web browser used to access the site wasnot updated to the latest version
Answer explanation
The correct choice is that the content was accessed using HTTP, which is an unencrypted protocol. This means that data transmitted over port 80 is vulnerable to interception, leading to potential compromise.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which Windows app is a command-line interface that includes a sophisticated scripting language used to automate Windows tasks?
VMware
Microsoft Management Console
MS-DOS
Powershell
Answer explanation
Powershell is a command-line interface specifically designed for Windows, featuring a powerful scripting language that allows users to automate various tasks efficiently, making it the correct choice.
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
ETECH 2ND QUARTER QUIZ

Quiz
•
9th - 12th Grade
20 questions
TLJ_KELAS XI_BAB 1

Quiz
•
11th Grade
25 questions
Quiz Pengetahuan Dasar Jaringan

Quiz
•
11th Grade - University
20 questions
Topic 1 Summary - Connected Digital systems and Smart Devices

Quiz
•
11th Grade
20 questions
Video Game Programming and Design Questions

Quiz
•
9th - 12th Grade
20 questions
PTS 7A

Quiz
•
7th Grade - University
25 questions
Social Engineering & Access Control Quiz

Quiz
•
11th Grade
25 questions
JARINGAN KOMPUTER

Quiz
•
11th Grade
Popular Resources on Wayground
15 questions
Hersheys' Travels Quiz (AM)

Quiz
•
6th - 8th Grade
20 questions
PBIS-HGMS

Quiz
•
6th - 8th Grade
30 questions
Lufkin Road Middle School Student Handbook & Policies Assessment

Quiz
•
7th Grade
20 questions
Multiplication Facts

Quiz
•
3rd Grade
17 questions
MIXED Factoring Review

Quiz
•
KG - University
10 questions
Laws of Exponents

Quiz
•
9th Grade
10 questions
Characterization

Quiz
•
3rd - 7th Grade
10 questions
Multiply Fractions

Quiz
•
6th Grade