
Chapter 12 Quiz
Quiz by Jeffrey Williams
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
Which of the following best describes spyware?
It monitors the actions you take on your machine and sends the information back to its originating source.
It monitors user actions that denote personal preferences and then sends pop-ups and ads to the user that match their tastes.
It is a malicious program that is disguised as legitimate software.
It is a program that attempts to damage a computer system and replicate itself to other computer systems.
30s - Q2
This is a method of limiting network access levels through assignment of permissions and rights based on the role of the user.
Zero trust
Confidentiality
Principle of least privilege
Role-based access control (RBAC)
30s - Q3
Which of the following CCTV types would you use in areas with little or no light?
C-mount
PTZ
Infrared
A camera with a high LUX rating
30s - Q4
This is a set of programs that allow attackers to maintain permanent and hidden administrator-level access to a computer. Attacks often position themselves in the boot sector of a computer.
Rootkit
Zombie
Trojan Horse
Botnet
30s - Q5
This is the idea that rights and permissions for each user or system are limited to only what is necessary for the user or system to accomplish their tasks or responsibilities.
Zero trust
Confidentiality
Role-based access control (RBAC)
Principle of least privilege
30s - Q6
Using sniffers has become one way for an attacker to view and gather network traffic. If an attacker overcomes your defenses and obtains network traffic, which of the following is the BEST countermeasure for securing the captured network traffic?
Eliminate unnecessary system applications.
Use intrusion detection countermeasures.
Use encryption for all sensitive traffic.
Implement acceptable use policies.
30s - Q7
Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on the network?
ARP poisoning
Port mirroring
MAC flooding
MAC spoofing
30s - Q8
This term describes the overall state and effectiveness of the security in a network’s hardware, software, databases, transmissions, or processes.
Process
Threat
Cybersecurity posture
Vulnerability
30s - Q9
Which of the following BEST describes an inside attacker?
An attacker with lots of resources and money at their disposal.
A good individual who tries to help a company see their vulnerabilities.
An unintentional threat actor (the most common threat).
An agent who uses their technical knowledge to bypass security.
30s - Q10
Five salespeople work out of your office. They frequently leave their laptops on the desks in their cubicles. You are concerned that someone might walk by and take one of these laptops.
Which of the following is the BEST way to address your concerns?Require strong passwords in the Local Security Policy.
Use cable locks to chain the laptops to the desks.
Encrypt all company data on the hard drives.
Implement screensaver passwords.
30s - Q11
A network utilizes a network access control (NAC) solution to defend against malware.
When a wired or wireless host tries to connect to the network, a NAC agent on the host checks it to make sure it has all of the latest operating system updates installed and that the latest antivirus definitions have been applied.
What is this process called?Port security
Posture assessment
Remediation
Quarantine
30s - Q12
This is a general term that is used for a type of software designed to take over or damage a computer without the user's knowledge or approval.
LabRat
Hoax
Trojan
Malware
30s - Q13
This type of malware is designed to facilitate identity theft by gaining access to a user's online financial accounts, such as banks and online retailers.
Logic Bomb
Crimeware
Spyware
Ransomware
30s - Q14
Which of the following is a common social engineering attack?
Distributing false information about your organization's financial status.
Using a sniffer to capture network traffic.
Logging on with stolen credentials.
Hoax virus information emails.
30s - Q15
This is a security strategy based on the concept that no users or devices should be allowed access to the network's sensitive data without proper authentication and authorization within the network.
Role-based access control (RBAC)
Confidentiality
Principle of least privilege
Zero trust
30s