
Cisco 1

Quiz
•
Physics
•
Professional Development
•
Hard
Roger White
FREE Resource
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term vulnerability mean?
a potential threat that a hacker creates
a weakness that makes a target susceptible to an attack
a method of attack to exploit a target
a known target or victim machine
a computer that contains sensitive information
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The employees in a company receive an email stating that the account password will expire immediately and requires a password reset within 5 minutes. Which statement would classify this email?
It is a piggy-back attack.
It is a hoax.
It is an impersonation attack.
It is a DDoS attack.
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What three best practices can help defend against social engineering attacks? (Choose three.)
Do not provide password resets in a chat window.
Deploy well-designed firewall appliances.
Enable a policy that states that the IT department should supply information over the phone only to managers.
Educate employees regarding policies.
Resist the urge to click on enticing web links.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cyber criminal sends a series of maliciously formatted packets to the database server. The server cannot parse the packets and the event causes the server to crash. What is the type of attack the cyber criminal launches?
SQL injection
DoS
packet Injection
man-in-the-middle
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security service company is conducting an audit in several risk areas within a major corporate client. What attack or data loss vector term would be used to describe providing access to corporate data by gaining access to stolen or weak passwords?
improper access control
hard copy
an internal threat
unencrypted devices
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A social media site is describing a security breach in a sensitive branch of a national bank. In the post, it refers to a vulnerability. What statement describes that term?
A weakness in a system or its design that could be exploited by a threat.
The actions that are taken to protect assets by mitigating a threat or reducing risk.
The potential damage to the organization that is caused by the threat.
The likelihood that a particular threat will exploit a vulnerability of an asset and result in an undesirable consequence.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first line of defense to protect a device from improper access control?
passwords
end user license agreement (EULA)
shredding
encryption
Create a free account and access millions of resources
Similar Resources on Wayground
12 questions
M8.2 Airflow Fundamentals

Quiz
•
Professional Development
15 questions
SINGLE PHASE INDUCTION MOTOR

Quiz
•
Professional Development
15 questions
SINGLE PHASE TRANSFORMER

Quiz
•
Professional Development
15 questions
Quantum Mechanics_Activity I

Quiz
•
Professional Development
10 questions
Heating System Controls Quiz

Quiz
•
Professional Development
10 questions
Connection of resistors

Quiz
•
12th Grade - Professi...
10 questions
M8.2 The Terms

Quiz
•
Professional Development
10 questions
M8.2 Aerodynamic resultant

Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade