Quiz Summary
0 of 12 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 12 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 12
1. Question
What is the primary risk of weak patch management for business PCs and laptops?
CorrectIncorrect -
Question 2 of 12
2. Question
A company uses a Windows 7 PC to run legacy software incompatible with Windows 11. What is the biggest security risk, and what is a key mitigation?
CorrectIncorrect -
Question 3 of 12
3. Question
Default passwords, unsecured root accounts, open ports, and weak encryption are examples of which vulnerability category?
CorrectIncorrect -
Question 4 of 12
4. Question
A workstation’s Notepad process (running as a local admin) starts an unknown process on a server (running as SYSTEM). Which attack types are likely involved?
CorrectIncorrect -
Question 5 of 12
5. Question
How can malicious updates introduce malware?
CorrectIncorrect -
Question 6 of 12
6. Question
Which attack exploits a web application’s database access by manipulating inputs?
CorrectIncorrect -
Question 7 of 12
7. Question
Before scanning for a newly announced CVE, what should you verify in your vulnerability scanner?
CorrectIncorrect -
Question 8 of 12
8. Question
In cybersecurity, what does OSINT refer to?
CorrectIncorrect -
Question 9 of 12
9. Question
Without an event management or threat intelligence platform, what is the main challenge in detecting an APT?
CorrectIncorrect -
Question 10 of 12
10. Question
What does the acronym CVE stand for in cybersecurity?
CorrectIncorrect -
Question 11 of 12
11. Question
A scan reports a CVE tied to CentOS, but the host does not run CentOS. What is this an example of?
CorrectIncorrect -
Question 12 of 12
12. Question
Which option provides financial coverage after a security breach caused by a vulnerability?
CorrectIncorrect