Search Header Logo

Security + quiz 14

Authored by Matt Hansen

Instructional Technology

Professional Development

Security + quiz 14
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A nuclear plant was the victim of a recent attack, and all the networks were air gapped. A subsequent investigation revealed a worm as the source of the issue. Which of the following BEST explains what happened?

A malicious USB was introduced by an unsuspecting employee.

The ICS firmware was outdated

A local machine has a RAT installed.

The HVAC was connected to the maintenance vendor.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Under GDPR, which of the following is MOST responsible for the protection of privacy and website user rights?

The data protection officer

The data processor

The data owner

The data controller

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user recent an SMS on a mobile phone that asked for bank delays. Which of the following social-engineering techniques was used in this case?

SPIM

Vishing

Spear phishing

Smishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator needs to create a RAIS configuration that is focused on high read speeds and fault tolerance. It is unlikely that multiple drivers will fail simultaneously. Which of the following RAID configurations should the administration use?

RA1D 0

RAID1

RAID 5

RAID 10

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is concerned that a web application will not be able to handle unexpected or random input without crashing. Which of the following BEST describes the type of testing the user should perform?

Code signing

Fuzzing

Manual code review

Dynamic code analysis

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator checks the table of a network switch, which shows the following output:

VLAN Physical Address Type Port

1 001a:42ff:5113 Dynamic GEO/5

1 0faa:abcf:ddee Dynamic GEO/5

1 c6a9:6b16:750e Dynamic GEO/5

1 a3aa:b6a3:1212 Dynamic GEO/5

1 8025:2ad8:bfac Dynamic GEO/5

1 b839:f995:a00a Dynamic GEO/5

Which of the following is happening to this switch?

MAC Flooding

DNS poisoning

MAC cloning

ARP poisoning

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company needs to centralize its logs to create a baseline and have visibility on its security events. Which of the following technologies will accomplish this objective?

Security information and event management

A web application firewall

A vulnerability scanner

A next-generation firewall

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?