Security+ Chapter 9
Start
Congratulations - you have completed Security+ Chapter 9.
You scored %%SCORE%% out of %%TOTAL%%.
Your answers are highlighted below.
Question 1 |
What can ICMP be used for?
A | SYN flood |
B | Port manipulation |
C | Ping sweeps |
D | MAC address spoofing |
Question 2 |
What are your options in respect to risk?
A | Accept, mitigate, or completely eliminate |
B | Diminish, transfer, or accept |
C | Transfer, accept, or concede |
D | Deny, disrupt, or delay |
Question 3 |
Why would you have one of your employees use a password cracker?
A | Test the strength of passwords |
B | Instill fear in users |
C | Protect against tampering |
D | Embarrass people who use weak passwords |
Question 4 |
What tool can be used to analyze network traffic and would be able to view plain text passwords that are sent in the clear?
A | Protocol analyzer |
B | Port scan |
C | Network mapper |
D | Ping sweep |
Question 5 |
Tools such as port scanners, network mappers, protocol analyzers, vulnerability scanners, and password crackers are used during a
A | Vulnerability assessment |
B | These are not legitimate tools |
C | Asset inventory |
D | Risk management |
Question 6 |
You can determine your Single Loss Expectancy (SLE) by multiplying the value of your assets by the _____________ of those assets.
A | Exposure value |
B | Loss expectancy |
C | Security posture |
D | Risk priority |
Question 7 |
How can you determine your Annualized Loss Expectancy?
A | Add your Single Loss Expectancy (SLE) to your Annualized Rate of Occurance (ARO). |
B | Multiply your Single Loss Expectancy (SLE) by the Annualized Rate of Occurance (ARO). |
C | You don't need to, your command will do this for you. |
D | Divide your Single Loss Expectancy (SLE) by the Annualized Rate of Occurance (ARO). |
Question 8 |
What is the likelihood that a threat agent will expolit a vulnerability?
A | Threat |
B | Vulnerability |
C | Weakness |
D | Risk |
Question 9 |
The goal of risk management is to completely eliminate risk.
A | False |
B | True |
Question 10 |
A vulnerability appraisal is a snapshot of your organizations security posture. During this appraisal your vulnerabilities are looked at in respect to
A | Risk Assessment Codes |
B | Threats |
C | Risk |
D | Exposure values |
Once you are finished, click the button below. Any items you have not completed will be marked incorrect.
Get Results
There are 10 questions to complete.
You have completed
questions
question
Your score is
Correct
Wrong
Partial-Credit
You have not finished your quiz. If you leave this page, your progress will be lost.
Correct Answer
You Selected
Not Attempted
Final Score on Quiz
Attempted Questions Correct
Attempted Questions Wrong
Questions Not Attempted
Total Questions on Quiz
Question Details
Results
Date
Score
Hint
Time allowed
minutes
seconds
Time used
Answer Choice(s) Selected
Question Text
All done
Need more practice!
Keep trying!
Not bad!
Good work!
Perfect!