AP CK CyberSecurity Unit 4
Quiz
•
Information Technology (IT)
•
12th Grade
•
Practice Problem
•
Easy
Kristina Rice
Used 2+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What security tool is being used to protect this network?
Collects data streams from multiple sources
Analyzes the data to detect patterns that may indicate a cyber attack
Raises an alert if a potential attack is detected
Security analysts investigate the alert to determine whether it represents a true threat
What security tool is being used to protect this network?
Network intrusion prevention system (NIPS)
Next-generation firewall (NGFW)
Web application firewall (WAF)
Security incident and event management (SIEM)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following methods is used to detect cyber attacks that are known and have been previously recorded?
Anomaly-based detection
Signature-based detection
Baselining detection
Hybrid detection
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During the reconnaissance phase of a cyber attack, an adversary was able to learn the following about a target:
A social media website revealed the target’s employer
The employer’s website revealed the office address
A public records website revealed the target’s home address
Which of the following resources did the adversary use to obtain this information?
Phishing
APT
Wiretapping
OSINT
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of shoulder surfing?
An adversary uses software that tracks all the keys a target presses on their keyboard
An adversary sets up a fake Wi-Fi hotspot to collect login credentials when users connect
An adversary steals a laptop that is left unattended in a coffee shop
An adversary watches a target enter their phone’s passcode
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following can be added to a password to prevent users with the same passwords from having the same password hash?
A second hashing algorithm
A token
A key derivation function
A salt
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A system administrator is reviewing the following authentication log. What might the anomaly on line 9 indicate?
The user’s password has been compromised
The system’s clock has reset on the network
The user logged in during a maintenance window
The user has accessed a restricted area
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following explains how a SQL injection attack can exploit an application?
It places SQL commands into a user-input field in an application with the intent to either return more information than it should or modify the data on the database
It places malicious JavaScript code into a SQL user-input field to steal user session cookies with the intent to use these cookies to gain authentication to the application
It uses the user-input field of the application to bypass user authentication requirements for the application to gain access to the application
It uses a user-input field in an application to send an overwhelming amount of data to the application in hopes to cause a denial of service attack on the application
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
10 questions
Network secutiry
Quiz
•
9th Grade - University
15 questions
Pengenalan Aplikasi AppSheet
Quiz
•
11th Grade - University
13 questions
Generative AI
Quiz
•
12th Grade
10 questions
Ultrasonic Sensor - L1
Quiz
•
6th Grade - University
15 questions
S2 Microsoft Access Database Quiz
Quiz
•
10th Grade - University
10 questions
MIL- Media Info Sources -DALTON
Quiz
•
12th Grade
11 questions
G 10- Understanding Main Memory and Cache
Quiz
•
10th Grade - University
14 questions
Digital Audio and Video
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
Discover more resources for Information Technology (IT)
28 questions
Ser vs estar
Quiz
•
9th - 12th Grade
34 questions
Geometric Terms
Quiz
•
9th - 12th Grade
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
16 questions
Proportional Relationships And Constant Of Proportionality
Quiz
•
7th - 12th Grade
10 questions
DNA Replication Concepts and Mechanisms
Interactive video
•
7th - 12th Grade
10 questions
Unit 2: LS.Bio.1.5-LS.Bio.2.2 Power Vocab
Quiz
•
9th - 12th Grade
20 questions
Food Chains and Food Webs
Quiz
•
7th - 12th Grade
15 questions
Identify Triangle Congruence Criteria
Quiz
•
9th - 12th Grade
