
Cybersecurity Practice

Quiz
•
Information Technology (IT)
•
11th Grade
•
Easy
CISCO CERTIFICATIONS
Used 23+ times
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A threat actor sets up a rogue access point (AP) at a local cafe. The rogue AP captures traffic and then forwards the traffic to the cafe AP. Which type of attack does this scenario describe?
Ransomware
DDos
Man-in-the Middle
Reconnaissance
Answer explanation
This scenario describes a Man-in-the-Middle attack, where the rogue access point intercepts and relays traffic between the user and the legitimate access point, allowing the attacker to capture sensitive information.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You notice that a new CVE has been shared to an email group that you belong to. What should you do first with the CVE?
Record the CVE as part of the disaster recovery plan
Look up the details of the vulnerability to determine whether it applies to your network
Add the CVE to the firewall rules for your organization
Research measures to prevent the CVE from attacking the network
Answer explanation
The first step is to look up the details of the CVE to assess its relevance to your network. Understanding the vulnerability helps determine the appropriate response and mitigation measures.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which password follows strong password policy guidelines?
Snuffy#
1mpressive1
Mar221984
Wh@tareyouDo1ngtoday4
Answer explanation
The password 'Wh@tareyouDo1ngtoday4' is strong because it includes a mix of uppercase and lowercase letters, numbers, and special characters, making it complex. The other options lack sufficient complexity or length.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Your supervisor tells you that you will participate in a CVSS assessment. What will you be doing?
Interviewing users to determine their level of cybersecurity awareness
Analyzing host logs to identify abnormal activities
Evaluating end system security and scoring vulverabilities
Performing penetration tests on internal network devices and systems
Answer explanation
In a CVSS assessment, you will evaluate end system security and score vulnerabilities to determine their severity and impact, which is essential for prioritizing remediation efforts.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
How do threat actors launch ransomware attacks on organizations?
They implant malware to collect data from the corporation's financial system
They deface an organization's public facing website
They secretly spy on employees and collect their personal information
They lock data and deny access until they receive money
Answer explanation
Ransomware attacks involve locking data and denying access until a ransom is paid. This method directly targets an organization's ability to operate, making it a primary tactic for threat actors.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The company web server collect information through a form. The form is accessed by using port 80. The form content is transferred to an encrypted database for storage. You are investigating a complaint that the form content has been compromised..
What is the cause of the security breach?
The data was transferred to the database using a nonsecure protocol
The database was compromised
The content was accessed using HTTP, which is an unencrypted protocol
The web browser used to access the site wasnot updated to the latest version
Answer explanation
The correct choice is that the content was accessed using HTTP, which is an unencrypted protocol. This means that data transmitted over port 80 is vulnerable to interception, leading to potential compromise.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which Windows app is a command-line interface that includes a sophisticated scripting language used to automate Windows tasks?
VMware
Microsoft Management Console
MS-DOS
Powershell
Answer explanation
Powershell is a command-line interface specifically designed for Windows, featuring a powerful scripting language that allows users to automate various tasks efficiently, making it the correct choice.
Create a free account and access millions of resources
Similar Resources on Wayground
25 questions
3. ADMINISTRASI SISTEM JARINGAN KELAS 12

Quiz
•
11th Grade
25 questions
Quis Bab 4 Membangun Berbagai Aplikasi Mobile Kelas XI

Quiz
•
11th Grade
20 questions
ICT quiz unit 2 electric boogaloo

Quiz
•
11th Grade
25 questions
Cambridge Technicals in IT - Unit 02 - LO6.6

Quiz
•
11th - 12th Grade
20 questions
TCP/IP

Quiz
•
11th Grade
20 questions
soal ujian

Quiz
•
11th Grade
23 questions
Net+2.2 Questions

Quiz
•
11th Grade
23 questions
T Level Digital Production: Business Context

Quiz
•
11th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
20 questions
Getting to know YOU icebreaker activity!

Quiz
•
6th - 12th Grade
10 questions
Impact of 9/11 and the War on Terror

Interactive video
•
10th - 12th Grade
28 questions
Ser vs estar

Quiz
•
9th - 12th Grade
6 questions
Biography

Quiz
•
4th - 12th Grade
16 questions
Metric Conversions

Quiz
•
11th Grade
25 questions
ServSafe Foodhandler Part 3 Quiz

Quiz
•
9th - 12th Grade
10 questions
Fact Check Ice Breaker: Two truths and a lie

Quiz
•
5th - 12th Grade