This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Cybersecurity Review 2

| See more in IT Security

Multiple choice review for Unit 2

SophathKong
Created Date 01.16.20
Last Updated 01.16.20
Viewed 4 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!

But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.

Download the Chakalaka mobile app here:
Topics of this game:
  • Select the CIA component that should have the highest level: Customer personal and financial information
  • Which of the following items would NOT be considered an IoT (Internet of Things) device?
  • This protocol/service’s job is to convert domain names (like google.com) into their corresponding IP addresses:
  • This type of attack employs MULTIPLE hosts to target websites and web servers with the intention of bringing the services they provide to a halt:
  • Which of the following server vulnerabilities CANNOT be remediated using IIS Manager?
  • The default Windows Web Server structure stores website, FTP, and log data in this directory:
  • The term used for increasing a system’s security and reducing its vulnerabilities:
  • A hacker discovers that they can log on to a web server with FileZilla using the username “anonymous” and no password and upload malicious files to it. What service have they exploited in this example?
  • You get an anonymous tip from a hacker advising you that your website doesn’t properly handle a common vulnerable exploit. It is cause popup alerts on your website. What type of exploit is this?
  • This programming language manages digital data stored in a relational database using CRUD (Create, Read, Update, and Delete):