Search Header Logo

Managing Security Risks: Quiz 2

Authored by John Coder

Computers

Professional Development

Used 3+ times

Managing Security Risks: Quiz 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Old systems that might not be accounted for or updated, but can still impact assets, such as workstations or old mainframe systems. For example, an organization might have an old vending machine that takes credit card payments or a workstation that is still connected to the le______ accounting sy______.

le____________ sy____________

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Outsourcing work to third-party vendors can give them access to intellectual property, such as trade secrets, software designs, and inventions

mul__________________ ri_______________

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A pre-authenticated vulnerability that affects the Microsoft Exchange server. This means a threat actor can complete a user authentication process to deploy malicious code from a remote location.

pro____________ lo___________

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A vulnerability in Microsoft’s Netlogon authentication protocol. An authentication protocol is a way to verify a person's identity. Netlogon is a service that ensures a user’s identity before allowing access to a website's location.

ze__________ lo___________

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Allows attackers to run Java code on someone else’s computer or leak sensitive information. It does this by enabling a remote attacker to take control of devices connected to the internet and run malicious code.

lo___4sh___

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Affects Windows New Technology Local Area Network (LAN) Manager (NTLM). It is a theft technique that allows a LAN-based attacker to initiate an authentication request.

peti____________ pota___________

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Allows attackers to manipulate a server-side application into accessing and updating backend resources. It can also allow threat actors to steal data.

server-side req_________ forg________

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?