A nuclear plant was the victim of a recent attack, and all the networks were air gapped. A subsequent investigation revealed a worm as the source of the issue. Which of the following BEST explains what happened?

Security + quiz 14

Quiz
•
Instructional Technology
•
Professional Development
•
Hard

Matt Hansen
FREE Resource
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A malicious USB was introduced by an unsuspecting employee.
The ICS firmware was outdated
A local machine has a RAT installed.
The HVAC was connected to the maintenance vendor.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Under GDPR, which of the following is MOST responsible for the protection of privacy and website user rights?
The data protection officer
The data processor
The data owner
The data controller
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user recent an SMS on a mobile phone that asked for bank delays. Which of the following social-engineering techniques was used in this case?
SPIM
Vishing
Spear phishing
Smishing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security administrator needs to create a RAIS configuration that is focused on high read speeds and fault tolerance. It is unlikely that multiple drivers will fail simultaneously. Which of the following RAID configurations should the administration use?
RA1D 0
RAID1
RAID 5
RAID 10
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user is concerned that a web application will not be able to handle unexpected or random input without crashing. Which of the following BEST describes the type of testing the user should perform?
Code signing
Fuzzing
Manual code review
Dynamic code analysis
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security administrator checks the table of a network switch, which shows the following output:
VLAN Physical Address Type Port
1 001a:42ff:5113 Dynamic GEO/5
1 0faa:abcf:ddee Dynamic GEO/5
1 c6a9:6b16:750e Dynamic GEO/5
1 a3aa:b6a3:1212 Dynamic GEO/5
1 8025:2ad8:bfac Dynamic GEO/5
1 b839:f995:a00a Dynamic GEO/5
Which of the following is happening to this switch?
MAC Flooding
DNS poisoning
MAC cloning
ARP poisoning
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company needs to centralize its logs to create a baseline and have visibility on its security events. Which of the following technologies will accomplish this objective?
Security information and event management
A web application firewall
A vulnerability scanner
A next-generation firewall
Create a free account and access millions of resources
Similar Resources on Quizizz
13 questions
AZ-400 | Mod-1 & 2

Quiz
•
Professional Development
12 questions
M2M Robustel

Quiz
•
University - Professi...
10 questions
FUN 101 Week 3 Review Hardware

Quiz
•
Professional Development
12 questions
Sec+ Domain 1.1

Quiz
•
Professional Development
10 questions
Class 2 - Objects and attributes

Quiz
•
Professional Development
10 questions
AI and Metacognition in Education

Quiz
•
Professional Development
10 questions
IT General Control

Quiz
•
Professional Development
10 questions
az-104_module-8

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade