BNS6 PT10

BNS6 PT10

University

28 Qs

quiz-placeholder

Similar activities

MATEMATIKA DISKRIT DAN LOGIKA INFORMATIKA

MATEMATIKA DISKRIT DAN LOGIKA INFORMATIKA

University

25 Qs

NM UNIT 1

NM UNIT 1

University

25 Qs

PTS GENAP KELAS 7 2025

PTS GENAP KELAS 7 2025

7th Grade - University

25 Qs

Stuff

Stuff

3rd Grade - Professional Development

23 Qs

Numbers from 0 to 100,000

Numbers from 0 to 100,000

University

24 Qs

01 - Graph Theory

01 - Graph Theory

University

25 Qs

TRANSFORMASI dan TRANSLASI

TRANSFORMASI dan TRANSLASI

7th Grade - University

25 Qs

Uji Pemahaman Baris dan Deret

Uji Pemahaman Baris dan Deret

10th Grade - University

25 Qs

BNS6 PT10

BNS6 PT10

Assessment

Quiz

Mathematics

University

Hard

Created by

jaret valdez

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst needs to find real-time data on the latest malware and loCs. Which of the following would BEST describes the solution the analyst should pursue?

  1. Advisories and bulletins

  1. Threat feeds

  1. Security news articles

  1. Peer-reviewed content

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following would cause a Chief Information Security Officer (CISO) the MOST concern regarding newly installed Internet-accessible 4K surveillance cameras?

  1. An inability to monitor 100%, of every facility could expose the company to unnecessary risk.

  1. The cameras could be compromised if not patched in a timely manner.

Physical security at the facility may not protect the cameras from theft.

  1. Ransomwere is communicating with a command-and-control server.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A financial institution would like to stare is customer data a could but still allow the data ta he accessed and manipulated while encrypted. Doing se would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution is not concern about computational overheads and slow speeds, Which of the following cryptographic techniques would BEST meet the requirement?

  1. Asymmatric

  1. Symmetric

  1. Homeomorphic

  1. Ephemeral

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A major political party experienced a server breach. The hacker then publicly posted stolen internal communications concerning campaign strategies to give the opposition party an advantage. Which of the following BEST describes these threat actors?

  1. Semi-authorized hackers

  1. State actors

  1. Script kiddies

  1. Advanced persistent threats

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following often operates in a client-server architecture to act as a service repository. providing enterprise consumers access to structured threat intelligence data?

  1. STIX

  1. CIRT

OSINT

  1. TAXII

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst is reviewing the following output from a system:

TCP192.168.10.10:80 192.168.1.2:60101 TIME WAIT

TCP 192.168.10.10:80 192.168.1.2:60102 TIME WAIT

TCP 192.168.10.10:80 192.168.1.2:60103 TIME WAIT

TCP 192.168.10.10:80 192.168.1.2:60104 TIME WAIT

TCP 192.168.10.10:80 192.168.1.2:60105 TIME WAIT

TCP 192.168.10.10:80 192.168.1.2:60106 TIME WAIT

TCP 192.168.10.10:80 192.168.1.2:60107 TIME WAIT

TCP 192.168.10.10:80 192.168.1.2:60108 TIME WAIT

TCP 192.168.10.10:80 192.168.1.2:60109 TIME WAIT

TCP 192.168.10.10:80 192.168.1.2:60110 TIME WAIT

Which of the following is MOST likely being observed?

  1. ARP palsoning

  1. Man in the middle

  1. Denial of service

  1. DNS poisoning

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following would a European company interested in implementing a technical, hands-on set of security standards MOST likely choose?

  1. GOPR

  1. CIS controls

  1. ISO 27001

  1. ISO 37000

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?