0% found this document useful (0 votes)
75 views

Introduction To Cybersecurity - Assessment

TADIPATRI MOHAMMED SOHAIL completed an assessment on cybersecurity topics on Apr 23 at 9:35 PM and received a passing grade of 100%. The assessment contained 10 multiple choice questions covering topics such as blockchain, SSL encryption, rootkits, polymorphic malware, spear phishing, DDoS attacks, WPA3, evil twin attacks, mobile threat protection, and the Cortex incident response platform. TADIPATRI answered all questions correctly.

Uploaded by

rohajebm
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views

Introduction To Cybersecurity - Assessment

TADIPATRI MOHAMMED SOHAIL completed an assessment on cybersecurity topics on Apr 23 at 9:35 PM and received a passing grade of 100%. The assessment contained 10 multiple choice questions covering topics such as blockchain, SSL encryption, rootkits, polymorphic malware, spear phishing, DDoS attacks, WPA3, evil twin attacks, mobile threat protection, and the Cortex incident response platform. TADIPATRI answered all questions correctly.

Uploaded by

rohajebm
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Completed: Apr 23 - 9:35 PM

TADIPATRI MOHAMMED SOHAIL

100 %

Assessment Passed
Congratulations! You answered enough questions correctly to receive a
passing grade.

Total Points: 10/10 Correct Answers: 10/10


View Response Details

Close
Response Details

Your Responses

Question 1 of 10 +1

Which specific technology is associated with Web


3.0?  6660425

social networks

instant messaging

blockchain

remote meeting software

Question 2 of 10 +1

Which tactic, technique, or procedure (TTP) masks


application traffic over port 443 (HTTPS)?   6660425

tunneling

hopping ports

using non-standard ports

hiding within SSL encryption

Question 3 of 10 +1

Which malware type is installed in the BIOS of a machine,


which means operating system level tools cannot detect
it?  6660425
ransomware

logic bomb

rootkit

spyware

Question 4 of 10 +1

Which type of advanced malware has entire sections of


code that serve no purpose other than to change the
signature of the malware, thus producing an infinite
number of signature hashes for even the smallest of
malware programs?  6660425

multi-functional

obfuscation

distributed

polymorphism

Question 5 of 10 +1

Which type of phishing attack is specifically directed at


senior executives or other high-profile targets within an
organization?  6660425

spear phishing

pharming

watering hole
whaling

Question 6 of 10 +1

Which type of cyberattack sends extremely high volumes


of network traffic such as packets, data, or transactions
that render the victim’s network unavailable or
unusable?  6660425

spamming botnet

distributed denial-of-service (DDoS)

phishing botnet

denial-of-service (DoS)

Question 7 of 10 +1

Which wireless security protocol includes improved


security for IoT devices, smart bulbs, wireless appliances,
and smart speakers?  6660425

WEP

WPA1

WPA3

WPA2

Question 8 of 10 +1

Which Wi-Fi attack leverages device information about


which wireless networks it previously connected to?
6660425

Jasager

man-in-the-middle

SSLstrip

evil twin

Question 9 of 10 +1

Which Zero Trust capability provides a combination of


anti-malware and intrusion prevention technologies to
protect against both known and unknown threats,
including mobile device threats?  6660425

cyberthreat protection

inspection of all traffic

least privilege

secure access

Question 10 of 10 +1

Which core component of Cortex combines security


orchestration, incident management, and interactive
investigation to serve security teams across the incident
lifecycle?  6660425
Cortex Data Lake

Cortex XDR

Cortex XSOAR

AutoFocus

You might also like