SEC+ Mod 6 Part 2

SEC+ Mod 6 Part 2

12th Grade

81 Qs

quiz-placeholder

Similar activities

Acronyms

Acronyms

KG - 12th Grade

78 Qs

NET+ Quiz Part 26

NET+ Quiz Part 26

12th Grade

80 Qs

ÔN TẬP TIẾNG ANH CN TCNH

ÔN TẬP TIẾNG ANH CN TCNH

8th Grade - University

85 Qs

EHE Module 4_5

EHE Module 4_5

12th Grade

77 Qs

NET+ Quiz Part 22

NET+ Quiz Part 22

12th Grade

81 Qs

SEC+ Mod 6 Part 4

SEC+ Mod 6 Part 4

12th Grade

86 Qs

Quiz6,7 COOS295

Quiz6,7 COOS295

12th Grade - University

82 Qs

SEC+ Mod 7 Part 2

SEC+ Mod 7 Part 2

12th Grade

80 Qs

SEC+ Mod 6 Part 2

SEC+ Mod 6 Part 2

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Pat Johnson

FREE Resource

81 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of data exposure?

Using encrypted HTTP instead of HTTPS

Failing to set up event logs for system activities

Accidentally making a database accessible to the public

Implementing proper logging and monitoring

Answer explanation

Accidentally making a database accessible to the public is an example of data exposure.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is inadequate logging and monitoring?

Failing to implement encryption for data in transit

Not configuring proper logging and monitoring

Making a database accessible to unauthorized users

Using HTTPS for transmitting sensitive data

Answer explanation

Not configuring proper logging and monitoring refers to the lack of setting up systems to track and analyze activities, making it difficult to detect and respond to security incidents effectively.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a consequence of unencrypted data transmission?

Data exposure

Eavesdropping

Proper logging and monitoring

Secure data transmission

Answer explanation

Eavesdropping is a consequence of unencrypted data transmission as it allows unauthorized parties to intercept and listen to the data being transmitted.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a zero-day vulnerability?

A vulnerability known to the software vendor

A vulnerability with public disclosure

A vulnerability unknown to the software vendor or the general public

A vulnerability with low risk

Answer explanation

A zero-day vulnerability is a vulnerability unknown to the software vendor or the general public, making it potentially dangerous due to the lack of available patches or defenses.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of a zero-day vulnerability?

Unknown to vendor

No public disclosure

Low risk

High risk

Answer explanation

The correct choice is 'Low risk' because zero-day vulnerabilities are typically considered high risk due to their unknown nature and lack of public disclosure.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a zero-day vulnerability?

A vulnerability that has been patched by the software vendor.

A vulnerability that is known to the public and has a fix available.

A vulnerability that is unknown to the software vendor and has no patches or updates available.

A vulnerability that is only found in hardware systems.

Answer explanation

A zero-day vulnerability is a vulnerability that is unknown to the software vendor and has no patches or updates available.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of zero-day vulnerabilities?

Unknown to vendor

No public disclosure

Low risk

Time window

Answer explanation

The correct choice is 'Low risk' because zero-day vulnerabilities are typically considered high risk due to their unknown nature and lack of public disclosure.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?