Search Header Logo

Domain 2.5 - Cybersecurity Mitigation Techniques Quiz

Authored by Ayomide Oluwaga

Computers

University

Used 2+ times

Domain 2.5 - Cybersecurity Mitigation Techniques Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user accidentally installs a Trojan disguised as a legitimate software application. What are the most appropriate mitigation strategies to prevent this type of attack?

Patching and Segmentation

Backups and Isolation

Antivirus, EDR, and Application allow listing

Disabling network access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A logic bomb is best described as:

Malicious code triggered by an event

Unwanted software that slows systems

Steals user data

Forcing entry (physical or digital)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key mitigation for rootkits?

File integrity monitoring and secure boot

Removal of unnecessary software

RFID shielding

Access badges

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is application allow listing considered a key control in cybersecurity?

It ensures only approved applications can run

It removes unnecessary software

It records keystrokes

It copies access card signals

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a physical attack that can be mitigated by locks, access badges, and MFA?

Brute force

RFID cloning

Environmental

Spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

RFID cloning is considered a threat to which type of security?

Physical access security

Environmental security

Software security

Data integrity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a mitigation for credential replay attacks that involve reusing stolen credentials?

MFA, Tokenization

Rate limiting, WAF, Scrubbing

Input validation, ASLR

WPA3, 802.1X, RADIUS

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?