
Security 5

Quiz
•
Other
•
Professional Development
•
Easy
Joe Smith
Used 3+ times
FREE Resource
51 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following threat vectors is most commonly utilized by insider threat actors attempting data exfiltration?
Unidentified removable devices
Default network device credentials
Spear phishing emails
Impersonation of business units through typosquatting
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following methods to secure credit card data is best to use when a requirement is to see only the last four numbers on a credit card?
Encryption
Hashing
Masking
Tokenization
Answer explanation
Masking involves hiding sensitive information by replacing it with a specific character, such as an asterisk (*). In the case of credit card numbers, masking would typically involve displaying only the last four digits, while the rest of the numbers are replaced with asterisks. This allows for partial visibility of the card number while protecting the sensitive information.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Chief Information Security Officer (CISO) has determined the company is non-compliant with local data privacy regulations. The CISO needs to justify the budget request for more resources. Which of the following should the CISO present to the board as the direct consequence of non-compliance?
Fines
Reputational damage
Sanctions
Contractual implications
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following alert types is the most likely to be ignored over time?
True positive
True negative
False positive
False negative
Answer explanation
C. False Positive - triggered when an event is NOT actually a threat. True Positive - an actual threat True Negative - no threat False Negative - an actual threat isn't detected, dangerous type since threats go unnoticed.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security analyst is investigating an application server and discovers that software on the server is behaving abnormally. The software normally runs batch jobs locally and does not generate traffic, but the process is now generating outbound traffic over random high ports. Which of the following vulnerabilities has likely been exploited in this software?
Memory injection
Race condition
Side loading
SQL injection
Answer explanation
A is correct. Memory injection allows the attackers to inject malicious code directly into the memory of a running process which can then be used to execute arbitrary commands or generate unauthorized network traffic. Race Condition refers to two processes competing to modify the same resource which can lead to unpredictable behavior but is less likely to cause abnormal outbound traffic. Side Loading refers to loading a malicious DLL into a legitimate process. SQL injection involves injecting malicious SQL code into a database and is primarily concerned with database manipulation rather than generating outbound network traffic.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An important patch for a critical application has just been released, and a systems administrator is identifying all of the systems requiring the patch. Which of the following must be maintained in order to ensure that all systems requiring the patch are updated?
Asset inventory
Network enumeration
Data certification
Procurement process
Answer explanation
The best answer is: A. Asset inventory An asset inventory is essential for ensuring that all systems requiring the patch are updated. By maintaining a comprehensive inventory of all systems, the administrator can identify which devices have the critical application installed and require the patch. An accurate asset inventory helps ensure that no systems are overlooked during the patching process. - Network enumeration focuses on identifying devices on the network but does not necessarily provide information about the applications running on those devices. - Data certification relates to validating the integrity and accuracy of data, which is unrelated to identifying systems needing patches. - Procurement process involves acquiring hardware or software but does not help track existing systems for patching needs. Therefore, an asset inventory is the best choice for maintaining awareness of all systems that require patching.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following should a security operations center use to improve its incident response procedure?
Playbooks
Frameworks
Baselines
Benchmarks
Answer explanation
A. Playbooks Its a step by step procedure outlining how to respond to specific types of incidents.
Create a free account and access millions of resources
Similar Resources on Wayground
50 questions
Verbal Communication Exam

Quiz
•
Professional Development
50 questions
I Years_Python

Quiz
•
Professional Development
50 questions
GK- Marathon 13,14 & 15

Quiz
•
8th Grade - Professio...
50 questions
Đề TM Testing Genius Part 2

Quiz
•
Professional Development
50 questions
Terrestrial and Coastal Navigation II

Quiz
•
Professional Development
46 questions
Mcqs on Stock market operations

Quiz
•
University - Professi...
50 questions
Career Paddies Quiz 9

Quiz
•
Professional Development
50 questions
General Knowledge Test #1 (CDL Permit)

Quiz
•
Professional Development
Popular Resources on Wayground
12 questions
Unit Zero lesson 2 cafeteria

Lesson
•
9th - 12th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
20 questions
Lab Safety and Equipment

Quiz
•
8th Grade
13 questions
25-26 Behavior Expectations Matrix

Quiz
•
9th - 12th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Other
11 questions
All about me

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
5 questions
Setting goals for the year

Quiz
•
Professional Development
14 questions
Disney Trivia

Quiz
•
Professional Development
14 questions
2019 Logos

Quiz
•
Professional Development
7 questions
How to Email your Teacher

Quiz
•
Professional Development
11 questions
NFL Football logos

Quiz
•
KG - Professional Dev...
20 questions
Employability Skills

Quiz
•
Professional Development