Domain 2.5 - Cybersecurity Mitigation Techniques Quiz

Domain 2.5 - Cybersecurity Mitigation Techniques Quiz

University

28 Qs

quiz-placeholder

Similar activities

Computer Software Quiz

Computer Software Quiz

University

25 Qs

Chapter 10: Security

Chapter 10: Security

11th Grade - University

25 Qs

ComNet (Part 1)

ComNet (Part 1)

University

23 Qs

Introduction to Computer

Introduction to Computer

University

30 Qs

CSC098 - Kuiz Chapter 12

CSC098 - Kuiz Chapter 12

University

23 Qs

IT 120 FFGG GROUP

IT 120 FFGG GROUP

University

25 Qs

Computer Software

Computer Software

6th Grade - University

25 Qs

Mock Test

Mock Test

University

27 Qs

Domain 2.5 - Cybersecurity Mitigation Techniques Quiz

Domain 2.5 - Cybersecurity Mitigation Techniques Quiz

Assessment

Quiz

Computers

University

Easy

Created by

Ayomide Oluwaga

Used 1+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user accidentally installs a Trojan disguised as a legitimate software application. What are the most appropriate mitigation strategies to prevent this type of attack?

Patching and Segmentation

Backups and Isolation

Antivirus, EDR, and Application allow listing

Disabling network access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A logic bomb is best described as:

Malicious code triggered by an event

Unwanted software that slows systems

Steals user data

Forcing entry (physical or digital)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key mitigation for rootkits?

File integrity monitoring and secure boot

Removal of unnecessary software

RFID shielding

Access badges

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is application allow listing considered a key control in cybersecurity?

It ensures only approved applications can run

It removes unnecessary software

It records keystrokes

It copies access card signals

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a physical attack that can be mitigated by locks, access badges, and MFA?

Brute force

RFID cloning

Environmental

Spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

RFID cloning is considered a threat to which type of security?

Physical access security

Environmental security

Software security

Data integrity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a mitigation for credential replay attacks that involve reusing stolen credentials?

MFA, Tokenization

Rate limiting, WAF, Scrubbing

Input validation, ASLR

WPA3, 802.1X, RADIUS

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?