Managing Security Risks: Quiz 2

Managing Security Risks: Quiz 2

Professional Development

11 Qs

quiz-placeholder

Similar activities

GDPR

GDPR

Professional Development

10 Qs

Networks & Network Topologies

Networks & Network Topologies

KG - Professional Development

6 Qs

Network + Quiz Domain 4 -5

Network + Quiz Domain 4 -5

Professional Development

9 Qs

Encryption

Encryption

Professional Development

15 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Wireless Security

Wireless Security

Professional Development

10 Qs

Knowledge Check (CC-41)

Knowledge Check (CC-41)

Professional Development

10 Qs

AZ-104_Module-1

AZ-104_Module-1

Professional Development

10 Qs

Managing Security Risks: Quiz 2

Managing Security Risks: Quiz 2

Assessment

Quiz

Computers

Professional Development

Hard

Created by

John Coder

Used 3+ times

FREE Resource

11 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Old systems that might not be accounted for or updated, but can still impact assets, such as workstations or old mainframe systems. For example, an organization might have an old vending machine that takes credit card payments or a workstation that is still connected to the le______ accounting sy______.

le____________ sy____________

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Outsourcing work to third-party vendors can give them access to intellectual property, such as trade secrets, software designs, and inventions

mul__________________ ri_______________

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A pre-authenticated vulnerability that affects the Microsoft Exchange server. This means a threat actor can complete a user authentication process to deploy malicious code from a remote location.

pro____________ lo___________

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A vulnerability in Microsoft’s Netlogon authentication protocol. An authentication protocol is a way to verify a person's identity. Netlogon is a service that ensures a user’s identity before allowing access to a website's location.

ze__________ lo___________

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Allows attackers to run Java code on someone else’s computer or leak sensitive information. It does this by enabling a remote attacker to take control of devices connected to the internet and run malicious code.

lo___4sh___

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Affects Windows New Technology Local Area Network (LAN) Manager (NTLM). It is a theft technique that allows a LAN-based attacker to initiate an authentication request.

peti____________ pota___________

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Allows attackers to manipulate a server-side application into accessing and updating backend resources. It can also allow threat actors to steal data.

server-side req_________ forg________

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?