Untitled - #10339
You will need to achieve a score of 80% or higher to pass the quiz. If you don’t pass on your first attempt, you can retake the quiz as needed.
Knowledge Check 2 Copy
Quiz Summary
0 of 8 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 8 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 8
1. Question
Which one of the following is not considered good practice when managing passwords?
CorrectIncorrect -
Question 2 of 8
2. Question
In an organization, positive security culture and awareness can be achieved by which of the following approach?
CorrectIncorrect -
Question 3 of 8
3. Question
Tricking users to give away their login credentials is an example of
CorrectIncorrect -
Question 4 of 8
4. Question
Which of the following is not affected by a web defacement incident?
CorrectIncorrect -
Question 5 of 8
5. Question
Upon infection, what a malware does is dependent on the
CorrectIncorrect -
Question 6 of 8
6. Question
The primary impact of a distributed denial of service attack is on which of the following security objectives
CorrectIncorrect -
Question 7 of 8
7. Question
In risk management, implementing counter measures such as a firewall or running security awareness campaigns are an example of
CorrectIncorrect -
Question 8 of 8
8. Question
Impersonating a user to gain access to systems accessible to that user is an example of
CorrectIncorrect