placeholder image to represent content

Chapter 12 Quiz

Quiz by Jeffrey Williams

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
53 questions
Show answers
  • Q1

    Which of the following best describes spyware?

    It monitors the actions you take on your machine and sends the information back to its originating source.

    It monitors user actions that denote personal preferences and then sends pop-ups and ads to the user that match their tastes.

    It is a malicious program that is disguised as legitimate software.

    It is a program that attempts to damage a computer system and replicate itself to other computer systems.

    30s
  • Q2

    This is a method of limiting network access levels through assignment of permissions and rights based on the role of the user.

    Zero trust

    Confidentiality

    Principle of least privilege

    Role-based access control (RBAC)

    30s
  • Q3

    Which of the following CCTV types would you use in areas with little or no light?

    C-mount

    PTZ

    Infrared

    A camera with a high LUX rating

    30s
  • Q4

    This is a set of programs that allow attackers to maintain permanent and hidden administrator-level access to a computer. Attacks often position themselves in the boot sector of a computer.

    Rootkit

    Zombie

    Trojan Horse

    Botnet

    30s
  • Q5

    This is the idea that rights and permissions for each user or system are limited to only what is necessary for the user or system to accomplish their tasks or responsibilities.

    Zero trust

    Confidentiality

    Role-based access control (RBAC)

    Principle of least privilege

    30s
  • Q6

    Using sniffers has become one way for an attacker to view and gather network traffic. If an attacker overcomes your defenses and obtains network traffic, which of the following is the BEST countermeasure for securing the captured network traffic?

    Eliminate unnecessary system applications.

    Use intrusion detection countermeasures.

    Use encryption for all sensitive traffic.

    Implement acceptable use policies.

    30s
  • Q7

    Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on the network?

    ARP poisoning

    Port mirroring

    MAC flooding

    MAC spoofing

    30s
  • Q8

    This term describes the overall state and effectiveness of the security in a network’s hardware, software, databases, transmissions, or processes.

    Process

    Threat

    Cybersecurity posture

    Vulnerability

    30s
  • Q9

    Which of the following BEST describes an inside attacker?

    An attacker with lots of resources and money at their disposal.

    A good individual who tries to help a company see their vulnerabilities.

    An unintentional threat actor (the most common threat).

    An agent who uses their technical knowledge to bypass security.

    30s
  • Q10

    Five salespeople work out of your office. They frequently leave their laptops on the desks in their cubicles. You are concerned that someone might walk by and take one of these laptops.

    Which of the following is the BEST way to address your concerns?

    Require strong passwords in the Local Security Policy.

    Use cable locks to chain the laptops to the desks.

    Encrypt all company data on the hard drives.

    Implement screensaver passwords.

    30s
  • Q11

    A network utilizes a network access control (NAC) solution to defend against malware.

    When a wired or wireless host tries to connect to the network, a NAC agent on the host checks it to make sure it has all of the latest operating system updates installed and that the latest antivirus definitions have been applied.

    What is this process called?

    Port security

    Posture assessment

    Remediation

    Quarantine

    30s
  • Q12

    This is a general term that is used for a type of software designed to take over or damage a computer without the user's knowledge or approval.

    LabRat

    Hoax

    Trojan

    Malware

    30s
  • Q13

    This type of malware is designed to facilitate identity theft by gaining access to a user's online financial accounts, such as banks and online retailers.

    Logic Bomb

    Crimeware

    Spyware

    Ransomware

    30s
  • Q14

    Which of the following is a common social engineering attack?

    Distributing false information about your organization's financial status.

    Using a sniffer to capture network traffic.

    Logging on with stolen credentials.

    Hoax virus information emails.

    30s
  • Q15

    This is a security strategy based on the concept that no users or devices should be allowed access to the network's sensitive data without proper authentication and authorization within the network.

    Role-based access control (RBAC)

    Confidentiality

    Principle of least privilege

    Zero trust

    30s

Teachers give this quiz to your class