Week 2

Week 2

Professional Development

11 Qs

quiz-placeholder

Similar activities

Cybersecurity Fundamentals

Cybersecurity Fundamentals

Professional Development

15 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

15 Qs

Security+ Lesson 8

Security+ Lesson 8

Professional Development

10 Qs

CCNA Security Pre-Assessment

CCNA Security Pre-Assessment

Professional Development

15 Qs

Internet Safety

Internet Safety

Professional Development

11 Qs

ITF - Quiz 14.4 - Uses of Encryption

ITF - Quiz 14.4 - Uses of Encryption

Professional Development

15 Qs

Securing Source Code

Securing Source Code

Professional Development

10 Qs

security+ (601)

security+ (601)

9th Grade - Professional Development

15 Qs

Week 2

Week 2

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Dove Soap

Used 3+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

______ finds and eliminates the main factor behind a problem for future prevention.

Indicator of Compromise (IoC)

Root Cause Analysis(RCA)

Identity and Access Management (IAM)

Confidentiality, Integrity, and Availability (CIA)

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two methods used to protect confidentiality?

Intrusion detection systems

Privileged access management

Encryption

Hashing

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The blue team may choose to conduct a simulated phishing campaign to manipulate employees into exposing confidential information.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is used to ensure the integrity of data?

Encryption

Multi-factor authentication

Hashing

Backup

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

System integrity can be protected through a process called

Baselining

Encryption

Authentication

Identification

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A common attack to disrupt availability is a

random attack

data breach

man-in-the-middle

DDos attack

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

YARA is important to security professionals because of its ability to

eradicate malware from your computer

block malicious emails

detect and classify malware

stop suspicious traffic

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?