Cisco 1

Cisco 1

Professional Development

11 Qs

quiz-placeholder

Similar activities

Pyisics

Pyisics

7th Grade - Professional Development

10 Qs

5-pin automotive relay

5-pin automotive relay

Professional Development

15 Qs

Quiz 8 Free Fall

Quiz 8 Free Fall

KG - Professional Development

10 Qs

Science Year 9

Science Year 9

8th Grade - Professional Development

12 Qs

Bernoulli Principle

Bernoulli Principle

Professional Development

10 Qs

Really really really hard

Really really really hard

University - Professional Development

16 Qs

Basic Electronics

Basic Electronics

University - Professional Development

15 Qs

Science Physics Express 1: Measurement_Micrometer Screw Gauge

Science Physics Express 1: Measurement_Micrometer Screw Gauge

Professional Development

10 Qs

Cisco 1

Cisco 1

Assessment

Quiz

Physics

Professional Development

Hard

Created by

Roger White

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term vulnerability mean?

a potential threat that a hacker creates

a weakness that makes a target susceptible to an attack

a method of attack to exploit a target


a known target or victim machine

a computer that contains sensitive information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The employees in a company receive an email stating that the account password will expire immediately and requires a password reset within 5 minutes. Which statement would classify this email?

It is a piggy-back attack.


It is a hoax.

It is an impersonation attack.


It is a DDoS attack.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What three best practices can help defend against social engineering attacks? (Choose three.)

Do not provide password resets in a chat window.

Deploy well-designed firewall appliances.

Enable a policy that states that the IT department should supply information over the phone only to managers.

Educate employees regarding policies.


Resist the urge to click on enticing web links.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cyber criminal sends a series of maliciously formatted packets to the database server. The server cannot parse the packets and the event causes the server to crash. What is the type of attack the cyber criminal launches?


SQL injection

DoS

packet Injection

man-in-the-middle

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security service company is conducting an audit in several risk areas within a major corporate client. What attack or data loss vector term would be used to describe providing access to corporate data by gaining access to stolen or weak passwords?

improper access control

hard copy

an internal threat


unencrypted devices

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A social media site is describing a security breach in a sensitive branch of a national bank. In the post, it refers to a vulnerability. What statement describes that term?

A weakness in a system or its design that could be exploited by a threat.


The actions that are taken to protect assets by mitigating a threat or reducing risk.

The potential damage to the organization that is caused by the threat.

The likelihood that a particular threat will exploit a vulnerability of an asset and result in an undesirable consequence.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first line of defense to protect a device from improper access control?

passwords


end user license agreement (EULA)

shredding

encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?