KLCP Practice Quiz # 11
0 of 7 questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
You made it through! Nice work! Be sure to take the other quizzes at the end of the other chapters. Also, be sure to read more about these quizzes and check out the KLCP hints and clues in the “KLCP quizzes” section of the Kali.training FAQ.
Note: You must wait three minutes to make another leaderboard entry.
|Table is loading|
|No data available|
Question 1 of 7
Which of the following are not a part of the “CIA triad”?CorrectIncorrect
Question 2 of 7
An organization owns a web server which generates revenue based on uptime. Which of the following security attributes of the system will be the primary focus of the organization?CorrectIncorrect
Question 3 of 7
A flaw has been found in a cryptographic algorithm that weakens the cryptographic system. Which of the following elements of the CIA triad are affected by this?CorrectIncorrect
Question 4 of 7
Which of the following best describe software that can be used to take advantage of a security weakness?CorrectIncorrect
Question 5 of 7
Which of the following (derived from likelihood of occurrence and impact) provides guidance to those responsible for securing and maintaining the systems in question?CorrectIncorrect
11.2. Types of Assessments; 188.8.131.52. Overall Risk
Question 6 of 7
Which of the following leverages identified issues to uncover the worst-case scenario?CorrectIncorrect
Question 7 of 7
Which of the following best describes a technique that is used to target the various applications installed on the workstation of an employee within a target organization?CorrectIncorrect
11.4. Types of Attacks; 11.4.5. Client-Side Attacks