Second Part

Second Part

University

10 Qs

quiz-placeholder

Similar activities

Python_Quiz_1

Python_Quiz_1

University

10 Qs

P3 IAS 2 Quiz

P3 IAS 2 Quiz

University

15 Qs

Keyboard Shortcuts

Keyboard Shortcuts

5th Grade - University

11 Qs

OOP-Q1

OOP-Q1

University

10 Qs

Melaka 2024

Melaka 2024

University

10 Qs

CLC Lesson 4&5 Quiz

CLC Lesson 4&5 Quiz

University

12 Qs

Java_Quiz_Part_2

Java_Quiz_Part_2

University

12 Qs

NoSQL Concepts 2

NoSQL Concepts 2

University

10 Qs

Second Part

Second Part

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Easy

Created by

karim reda

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a key legal requirement before starting a penetration test?

Performing reconnaissance without informing the client

Obtaining explicit informed consent from the organization

Only testing public-facing systems without permission

Sharing test results with third parties for verification

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which activity aligns with the Reporting and Transparency principle?

Avoiding vulnerability disclosure to keep systems secure

Providing detailed findings and remediation steps to the client

Conducting stealth testing without client awareness

Expanding the scope of testing without permission

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

n the context of penetration testing, compliance with EG-CERT regulations in Egypt primarily aims to:

Secure only cloud-based systems from cyber threats.

Ensure adherence to national cybersecurity requirements.

Protect personal data of EU citizens.

Prevent physical theft of IT equipment.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which compliance standard is specifically designed to secure payment systems and protect cardholder data?

GDPR

EG-CERT

PCI-DSS

ISO 27001

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary objective of PCI-DSS compliance?

Preventing phishing attacks targeting employees

Ensuring compliance only for organizations in the financial sector

Protecting sensitive cardholder data such as card numbers and expiration dates

Encrypting all email communications between customers and merchants

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a PCI-DSS compliance audit, a penetration test reveals several vulnerabilities. What is the correct next step to maintain compliance?

Ignore low-severity vulnerabilities as they do not affect compliance q

Remediate identified vulnerabilities based on penetration testing recommendations

Document vulnerabilities without implementing changes

Perform penetration testing only after the annual compliance review

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In the context of Cobalt Strike, which phase involves creating a persistent link between the attacker and the compromised host?

Lateral Movement

Data Exfiltration

Command and Control

Reconnaissance

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?