Security I - Day 3 - Review of Day 2

Security I - Day 3 - Review of Day 2

Professional Development

12 Qs

quiz-placeholder

Similar activities

Lesson 2.6 Computer Fundamentals

Lesson 2.6 Computer Fundamentals

Professional Development

16 Qs

Cyber Resilience Training

Cyber Resilience Training

Professional Development

16 Qs

AI Cybersecurity Quiz

AI Cybersecurity Quiz

Professional Development

15 Qs

Physical Security Controls

Physical Security Controls

Professional Development

10 Qs

SE Master

SE Master

Professional Development

8 Qs

Cybersecurity Concepts

Cybersecurity Concepts

Professional Development

10 Qs

Web Application Security  and WAF Training

Web Application Security and WAF Training

Professional Development

16 Qs

Windows Updates

Windows Updates

9th Grade - Professional Development

8 Qs

Security I - Day 3 - Review of Day 2

Security I - Day 3 - Review of Day 2

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Rehan Ahmed

Used 2+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the topic of the Day 2 Lecture?

Vulnerabilities and Threats

Physical Security/Virtualization and Cloud Security

Authentication/ Authorization and Access Control

Introduction to Security Terminology/Types of Attacks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What as a domain is included in Homework # 1?

Architecture and Design

Implementation

Attacks, Threats, and Vulnerabilities

Operations and Incident Response

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the topic of SkillSoft Video Training of Day 2?

Social Engineering Techniques & Attack Types

Threat Actors, Intelligence Sources, & Vulnerabilities

Authentication & Authorization Design Concepts

Security Policies, Regulations, Standards, & Frameworks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A script kiddie would most likely be involved in what type of activity?

Creating password cracking scripts to compromise networks

Developing and testing hacker tools

Vandalizing public websites

Intercepting and modifying email messages

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security goal is compromised by a DDoS attack?

Confidentiality

Integrity

Nonrepudiation

Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary risk of an integer overflow attack?

Header manipulation

Arbitrary code execution

Session hijacking

Directory traversal

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can be used to launch a coordinated DDoS attack?

Bot

Rootkit

Adware

Worm

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?