
quiz 3

Quiz
•
Science, Computers
•
Professional Development
•
Hard
teeviraj janki
Used 1+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
20 sec • 20 pts
Which of the following are unique characteristics of
a rainbow table attack but not of a brute-force
attack? (Select two.)
This attack doesn’t require the hashed passwords
This attack involves precomputed hash values
This attack must be conducted online
This attack circumvents account lockout
restrictions
2.
MULTIPLE CHOICE QUESTION
20 sec • 20 pts
You decided to implement TLS encryption between
two servers to protect the data being transferred
between them. Which of the following states of data
best represents what you are putting in place?
data in rest
data in transit
data in use
data in processing
3.
MULTIPLE CHOICE QUESTION
20 sec • 20 pts
A security analyst is reviewing the following attack log output:
Which of the following types of attacks does this MOST likely represent?
rainbow attack
brute force
password spraying
dictionary
4.
MULTIPLE CHOICE QUESTION
20 sec • 20 pts
A major clothing company recently lost a large amount of proprietary information. The security officer must find a solution to ensure this never happens again. Which of the following is the BEST technical implementation to prevent this from happening again?
Configure DLP solutions
Enable role-based
Mandate job rotation
Implement content filters
5.
MULTIPLE SELECT QUESTION
20 sec • 20 pts
Your organization has been moving new
applications from the testing environment directly
to production, but lately there have been many
issues. You have been asked to help mitigate these
issues. Which of the following are the most
appropriate? (Select two.)
Move the code to both production environments
to troubleshoot on one in case the other fails.
Set up a parallel production environment.
Set up a staging environment to closely match the
production environment.
Move the code to staging prior to moving it to
production.
6.
MULTIPLE CHOICE QUESTION
20 sec • 20 pts
The IT department on-site developer has been with the team for many years. Each time an application is released, the security team is able to identify multiple vulnerabilities. Which of the following would BEST help the team ensure the application is ready to be released to production?
Limit the use of third-party libraries
Prevent data exposure queries
Obfuscate the source code
Submit the application to QA before releasing it.
7.
MULTIPLE CHOICE QUESTION
20 sec • 20 pts
Which of the following is an example of two-factor
authentication?
Website requiring username and password
ATM requiring credit card and PIN
Website requiring a one-time token code to log in
ATM requiring facial recognition
Create a free account and access millions of resources
Similar Resources on Wayground
11 questions
Domain 1 Quizizz Game (Social Engineering Techniques)

Quiz
•
Professional Development
15 questions
Security+ Study Guide-10 Understanding Cryptography and PKI

Quiz
•
Professional Development
10 questions
Post Assessment - Cybersecurity Awareness

Quiz
•
9th Grade - Professio...
7 questions
Level 5 - Security Overview Quiz

Quiz
•
Professional Development
12 questions
ITF - Quiz 13.1 - Securing Devices

Quiz
•
Professional Development
6 questions
Standard Chartered Elastic Day May 2025

Quiz
•
Professional Development
15 questions
First Aid

Quiz
•
Professional Development
14 questions
cyber security

Quiz
•
KG - Professional Dev...
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade