Day 4 - Security I - Day 3 Review - 1st Review

Day 4 - Security I - Day 3 Review - 1st Review

Professional Development

22 Qs

quiz-placeholder

Similar activities

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

Security

Security

Professional Development

20 Qs

Day 4 - Security I - Day 4 Review - 2nd Review

Day 4 - Security I - Day 4 Review - 2nd Review

Professional Development

17 Qs

MTA - Mobility and Devices Fundamentals Part 1

MTA - Mobility and Devices Fundamentals Part 1

10th Grade - Professional Development

20 Qs

AI in Cybersecurity

AI in Cybersecurity

Professional Development

27 Qs

A+ - 16C - Configure SOHO Router Security

A+ - 16C - Configure SOHO Router Security

Professional Development

24 Qs

A+ - 17A - Managing Security Settings

A+ - 17A - Managing Security Settings

Professional Development

24 Qs

Sec+ Extra Study

Sec+ Extra Study

Professional Development

23 Qs

Day 4 - Security I - Day 3 Review - 1st Review

Day 4 - Security I - Day 3 Review - 1st Review

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Rehan Ahmed

Used 4+ times

FREE Resource

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the theme topic of Day 3?

Wireless Networking and Security/Mobile Device Management

Vulnerabilities and Threats

Introduction to Information Security: Network Basics and Terminology

Introduction to Security Terminology / Types of Attacks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the SkillSoft Video Training Topic of Day 3?

Social Engineering Techniques & Attack Types

Identifying Different Cyber Attacks

Implementing Secure Protocols & Application Security Solutions

Threat Actors, Intelligence Sources, & Vulnerabilities

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term describes the technique or method used to exploit a vulnerability or deliver a malware payload?

Threat vector

Threat agent

Threat category

Threat actor

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these third-party risks would most likely occur due to the use of unsecure coding practices and lack of testing?

System integration

Outsourced container development

Data storage

Supply chain activities

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which source of research would be published by the IEEE?

TTP

OSINT

RFC

Twitter

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is an advantage of on-premise database solution as opposed to a cloud service provider?

The public API calls are likely protected with digital signatures

You will often leverage a cloud access security broker

The threat actors are typically internal privileged users

Many accounts will reduce the attack surface

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What component will typically store the instances of all organizational configuration items?

SCADA

CASB

CMDB

APT

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?