Day 4 - Security I - Day 3 Review - 1st Review

Day 4 - Security I - Day 3 Review - 1st Review

Professional Development

22 Qs

quiz-placeholder

Similar activities

Web Application Security Testing-PreTest

Web Application Security Testing-PreTest

Professional Development

20 Qs

CompTIA Security+ Quiz

CompTIA Security+ Quiz

Professional Development

25 Qs

KM1 - NETWORK FUNDAMENTALS | DAY 3

KM1 - NETWORK FUNDAMENTALS | DAY 3

Professional Development

20 Qs

Null Ahmedabad October Quiz

Null Ahmedabad October Quiz

Professional Development

21 Qs

security 760-799

security 760-799

Professional Development

25 Qs

CySa+ PT5: 2 of 3

CySa+ PT5: 2 of 3

9th Grade - Professional Development

20 Qs

Security SY06-01

Security SY06-01

Professional Development

20 Qs

Cyber Quiz

Cyber Quiz

Professional Development

17 Qs

Day 4 - Security I - Day 3 Review - 1st Review

Day 4 - Security I - Day 3 Review - 1st Review

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Rehan Ahmed

Used 4+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the theme topic of Day 3?

Wireless Networking and Security/Mobile Device Management

Vulnerabilities and Threats

Introduction to Information Security: Network Basics and Terminology

Introduction to Security Terminology / Types of Attacks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the SkillSoft Video Training Topic of Day 3?

Social Engineering Techniques & Attack Types

Identifying Different Cyber Attacks

Implementing Secure Protocols & Application Security Solutions

Threat Actors, Intelligence Sources, & Vulnerabilities

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term describes the technique or method used to exploit a vulnerability or deliver a malware payload?

Threat vector

Threat agent

Threat category

Threat actor

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these third-party risks would most likely occur due to the use of unsecure coding practices and lack of testing?

System integration

Outsourced container development

Data storage

Supply chain activities

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which source of research would be published by the IEEE?

TTP

OSINT

RFC

Twitter

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is an advantage of on-premise database solution as opposed to a cloud service provider?

The public API calls are likely protected with digital signatures

You will often leverage a cloud access security broker

The threat actors are typically internal privileged users

Many accounts will reduce the attack surface

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What component will typically store the instances of all organizational configuration items?

SCADA

CASB

CMDB

APT

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?