Security 5

Security 5

Professional Development

51 Qs

quiz-placeholder

Similar activities

Plumbing Health and safety  edited

Plumbing Health and safety edited

Professional Development

47 Qs

I Years_Python

I Years_Python

Professional Development

50 Qs

GK- Marathon 13,14 & 15

GK- Marathon 13,14 & 15

8th Grade - Professional Development

50 Qs

SY0-501 Practice Quiz 8

SY0-501 Practice Quiz 8

Professional Development

50 Qs

CST REVIEW EXAM # 2

CST REVIEW EXAM # 2

Professional Development

50 Qs

Python Lists

Python Lists

Professional Development

50 Qs

Career Paddies Quiz 13

Career Paddies Quiz 13

Professional Development

50 Qs

Terrestrial and Coastal Navigation II

Terrestrial and Coastal Navigation II

Professional Development

50 Qs

Security 5

Security 5

Assessment

Quiz

Other

Professional Development

Easy

Created by

Joe Smith

Used 3+ times

FREE Resource

51 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following threat vectors is most commonly utilized by insider threat actors attempting data exfiltration?

Unidentified removable devices

Default network device credentials

Spear phishing emails

Impersonation of business units through typosquatting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following methods to secure credit card data is best to use when a requirement is to see only the last four numbers on a credit card?

Encryption

Hashing

Masking

Tokenization

Answer explanation

Masking involves hiding sensitive information by replacing it with a specific character, such as an asterisk (*). In the case of credit card numbers, masking would typically involve displaying only the last four digits, while the rest of the numbers are replaced with asterisks. This allows for partial visibility of the card number while protecting the sensitive information.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Chief Information Security Officer (CISO) has determined the company is non-compliant with local data privacy regulations. The CISO needs to justify the budget request for more resources. Which of the following should the CISO present to the board as the direct consequence of non-compliance?

Fines

Reputational damage

Sanctions

Contractual implications

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following alert types is the most likely to be ignored over time?

True positive

True negative

False positive

False negative

Answer explanation

C. False Positive - triggered when an event is NOT actually a threat. True Positive - an actual threat True Negative - no threat False Negative - an actual threat isn't detected, dangerous type since threats go unnoticed.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst is investigating an application server and discovers that software on the server is behaving abnormally. The software normally runs batch jobs locally and does not generate traffic, but the process is now generating outbound traffic over random high ports. Which of the following vulnerabilities has likely been exploited in this software?

Memory injection

Race condition

Side loading

SQL injection

Answer explanation

A is correct. Memory injection allows the attackers to inject malicious code directly into the memory of a running process which can then be used to execute arbitrary commands or generate unauthorized network traffic. Race Condition refers to two processes competing to modify the same resource which can lead to unpredictable behavior but is less likely to cause abnormal outbound traffic. Side Loading refers to loading a malicious DLL into a legitimate process. SQL injection involves injecting malicious SQL code into a database and is primarily concerned with database manipulation rather than generating outbound network traffic.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An important patch for a critical application has just been released, and a systems administrator is identifying all of the systems requiring the patch. Which of the following must be maintained in order to ensure that all systems requiring the patch are updated?

Asset inventory

Network enumeration

Data certification

Procurement process

Answer explanation

The best answer is: A. Asset inventory An asset inventory is essential for ensuring that all systems requiring the patch are updated. By maintaining a comprehensive inventory of all systems, the administrator can identify which devices have the critical application installed and require the patch. An accurate asset inventory helps ensure that no systems are overlooked during the patching process. - Network enumeration focuses on identifying devices on the network but does not necessarily provide information about the applications running on those devices. - Data certification relates to validating the integrity and accuracy of data, which is unrelated to identifying systems needing patches. - Procurement process involves acquiring hardware or software but does not help track existing systems for patching needs. Therefore, an asset inventory is the best choice for maintaining awareness of all systems that require patching.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following should a security operations center use to improve its incident response procedure?

Playbooks

Frameworks

Baselines

Benchmarks

Answer explanation

A. Playbooks Its a step by step procedure outlining how to respond to specific types of incidents.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?