quiz10
pdf
keyboard_arrow_up
School
South Texas College *
*We aren’t endorsed by this school
Course
2435
Subject
Information Systems
Date
Dec 6, 2023
Type
Pages
3
Uploaded by DoctorMetal770
View Assessment
1/3
Quiz 10
Quiz Content
Question 1
10 Points
Which of the following attack simulations detect vulnerabilities and attempt to exploit them? Choose two.
Red team-blue team exercise
Vulnerability assessment
Security audit
Pen testing
Question 2
10 Points
You need to securely store handheld radios for your network technicians to take with them when they’re troubleshooting problems around your
campus network. What’s the best way to store these radios so all your techs can get to them and so you can track who has the radios?
Locking rack
Smart locker
Locking cabinet
Access control vestibule
Question 3
10 Points
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old
company’s servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind
of attack is this?
Principle of least privilege
Insider threat
Vulnerability
Denial of service
Question 4
10 Points
21 minutes remaining
0
OF 10 QUESTIONS REMAINING
View Assessment
2/3
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000.
What type of threat was this?
Ransomware
Logic bomb
Virus
Worm
Question 5
10 Points
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by
hackers to collect information from people who make the same typo. What kind of attack is this?
Phishing
Tailgating
Quid pro quo
Baiting
Question 6
10 Points
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside
the project’s team members. What type of document should they use?
AUP
NDA
MDM
BYOD
Question 7
10 Points
Which of the following is considered a secure protocol?
FTP
SSH
Telnet
HTTP
Question 8
10 Points
What type of attack relies on spoofing?
Deauth attack
View Assessment
3/3
Friendly DoS attack
Tailgating
Pen testing
Question 9
10 Points
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your
recommendations for the upgrade priorities?
Data breach
Security audit
Exploit
Posture assessment
Question 10
10 Points
Which type of DoS attack orchestrates an attack bounced off uninfected computers?
FTP bounce
Ransomware
DRDoS attack
PDoS attack
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help