Incident Handling

Incident Handling

University

13 Qs

quiz-placeholder

Similar activities

Pre Test Modul 5 Kelas C

Pre Test Modul 5 Kelas C

University

10 Qs

1_Parcial_RC

1_Parcial_RC

University

15 Qs

Sec. 7: ELB & ASG - Elastic Load Balancing & Auto Scaling Groups

Sec. 7: ELB & ASG - Elastic Load Balancing & Auto Scaling Groups

University

9 Qs

Culture générale

Culture générale

11th Grade - Professional Development

16 Qs

Web Application Attacks

Web Application Attacks

University

11 Qs

Sec. 12: Leveraging the AWS Global Infrastructure

Sec. 12: Leveraging the AWS Global Infrastructure

University

8 Qs

Cyber security quiz 2

Cyber security quiz 2

University

10 Qs

ข้อสอบหลังเรียนบทที่2

ข้อสอบหลังเรียนบทที่2

KG - University

15 Qs

Incident Handling

Incident Handling

Assessment

Quiz

Instructional Technology

University

Hard

Created by

Jason Webb

Used 6+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are types of HTTP request methods? (Choose all that apply).

PLACE

GET

POST

HEAD

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following HTTP response code indicate success?

500

300

200

400

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A URL is composed of which two components?

Protocol

URI

Domain

IP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encoding type is generally represented by a percent character "%" followed by two hexadecimal digits?

Base32

Base64

Hashing

URL Encoding

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following string is an example of what within an HTTP header? "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 (.NET CLR 3.5.30729)"

User Agent

Content Type

Cookie

Referrer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any occurrence in a network or system, such as opening a file or restarting the computer is considered what?

Log

Incident

Event

Anomaly

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which source of information would most likely contain events surrounding possible data exfiltration?

IDS/IPS

SIEM

DLP

EDR

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?