SEC+ Mod 6 Part 2

SEC+ Mod 6 Part 2

12th Grade

81 Qs

quiz-placeholder

Similar activities

FP.GM.IT.0360.PruebaDiagnostica

FP.GM.IT.0360.PruebaDiagnostica

9th - 12th Grade

77 Qs

UN Akuntansi SMK

UN Akuntansi SMK

12th Grade

80 Qs

my personal quiz

my personal quiz

9th - 12th Grade

82 Qs

Year 7 End of Year Quiz

Year 7 End of Year Quiz

6th Grade - University

82 Qs

TECH Database ALL

TECH Database ALL

9th - 12th Grade

81 Qs

Cybersecurity Pre-Test Questions

Cybersecurity Pre-Test Questions

11th Grade - University

76 Qs

CompTIA A+ 1102

CompTIA A+ 1102

9th Grade - Professional Development

77 Qs

AQA A-Level Grand Quiz

AQA A-Level Grand Quiz

11th - 12th Grade

80 Qs

SEC+ Mod 6 Part 2

SEC+ Mod 6 Part 2

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

Created by

Pat Johnson

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

81 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of data exposure?

Using encrypted HTTP instead of HTTPS

Failing to set up event logs for system activities

Accidentally making a database accessible to the public

Implementing proper logging and monitoring

Answer explanation

Accidentally making a database accessible to the public is an example of data exposure.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is inadequate logging and monitoring?

Failing to implement encryption for data in transit

Not configuring proper logging and monitoring

Making a database accessible to unauthorized users

Using HTTPS for transmitting sensitive data

Answer explanation

Not configuring proper logging and monitoring refers to the lack of setting up systems to track and analyze activities, making it difficult to detect and respond to security incidents effectively.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a consequence of unencrypted data transmission?

Data exposure

Eavesdropping

Proper logging and monitoring

Secure data transmission

Answer explanation

Eavesdropping is a consequence of unencrypted data transmission as it allows unauthorized parties to intercept and listen to the data being transmitted.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a zero-day vulnerability?

A vulnerability known to the software vendor

A vulnerability with public disclosure

A vulnerability unknown to the software vendor or the general public

A vulnerability with low risk

Answer explanation

A zero-day vulnerability is a vulnerability unknown to the software vendor or the general public, making it potentially dangerous due to the lack of available patches or defenses.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of a zero-day vulnerability?

Unknown to vendor

No public disclosure

Low risk

High risk

Answer explanation

The correct choice is 'Low risk' because zero-day vulnerabilities are typically considered high risk due to their unknown nature and lack of public disclosure.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a zero-day vulnerability?

A vulnerability that has been patched by the software vendor.

A vulnerability that is known to the public and has a fix available.

A vulnerability that is unknown to the software vendor and has no patches or updates available.

A vulnerability that is only found in hardware systems.

Answer explanation

A zero-day vulnerability is a vulnerability that is unknown to the software vendor and has no patches or updates available.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of zero-day vulnerabilities?

Unknown to vendor

No public disclosure

Low risk

Time window

Answer explanation

The correct choice is 'Low risk' because zero-day vulnerabilities are typically considered high risk due to their unknown nature and lack of public disclosure.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?