You are on page 1of 4

1/24/24, 11:46 PM Operations Security and Cryptography - Bases of Web Technology - PostQuiz: Attempt review


 Dashboard / Primer 2.0 - Infrastructure Security / Stage 1 / Security & Cybersecurity fundamentals

/ Operations Security and Cryptography - Bases of Web Technology

Quiz review
Started on Wednesday, 24 January 2024, 11:41 PM
State Finished
Completed on Wednesday, 24 January 2024, 11:46 PM
Time taken 4 mins 16 secs
Marks 8.00/10.00
Grade 80.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

46684
An email needs to be sent securely, and the sender wants to ensure the recipient can verify the email's origin and integrity. Which technology should be
used?

SQL Injection
SSL
Digital Signatures
Symmetric Encryption

The correct answer is: Digital Signatures

Question 2
Incorrect
46684
Mark 0.00 out of 1.00

A user suspects that their password was compromised due to a website vulnerability. What security threat might they be a victim of?

Digital Certificate Exploitation


Cross Site Scripting (XSS) 
IP Spoofing
SQL Injection

The correct answer is: SQL Injection 46684

https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1057304&cmid=8050 1/4
1/24/24, 11:46 PM Operations Security and Cryptography - Bases of Web Technology - PostQuiz: Attempt review

Question 3
Correct

Mark 1.00 out of 1.00

An organization needs to monitor and analyze its network traffic for security incidents and breaches. What type of system should they use?

Symmetric Encryption
SEM (Security Event Management) & SIEM (Security Information and Event Management)
Data Loss Prevention Software
Public Key Encryption

The correct answer is: SEM (Security Event Management) & SIEM (Security Information and Event Management)

Question 4
Correct

Mark 1.00 out of 1.00

46684
A user receives an email claiming to be from a trusted source, but they are unsure if it's genuine. What technology can help verify the email's authenticity?

Cross Site Scripting (XSS)


Digital Certificate Exploitation
Digital Signatures
IP Spoofing

The correct answer is: Digital Signatures

Question 5
Correct
46684
Mark 1.00 out of 1.00

An organization needs to protect sensitive data stored in a database. What security measure should they implement to prevent unauthorized access?

Public Key Encryption


Digital Certificates
IPSec
Symmetric Encryption

The correct answer is: Symmetric Encryption


46684

https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1057304&cmid=8050 2/4
1/24/24, 11:46 PM Operations Security and Cryptography - Bases of Web Technology - PostQuiz: Attempt review

Question 6
Correct

Mark 1.00 out of 1.00

A company wants to ensure the privacy and security of emails sent within the organization. What technology should they consider implementing?

IPSec
Logging
SSL
S/MIME

The correct answer is: S/MIME

Question 7
Correct

Mark 1.00 out of 1.00

46684
A company wants to secure its internal communications and data transfers over the internet. What technology can help achieve this goal?

SQL Injection
Symmetric Encryption
SSL
IPSec

The correct answer is: IPSec

Question 8
Incorrect
46684
Mark 0.00 out of 1.00

A company wants to ensure that only authorized personnel can access its internal network. What technology should they implement?

Digital Certificates
Public Key Encryption
Secure Shell (SSH)
IPSec 

The correct answer is: Secure Shell (SSH)


46684

https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1057304&cmid=8050 3/4
1/24/24, 11:46 PM Operations Security and Cryptography - Bases of Web Technology - PostQuiz: Attempt review

Question 9
Correct

Mark 1.00 out of 1.00

A website is vulnerable to malicious code injection, allowing attackers to steal sensitive data. What type of attack is this?

IP Spoofing
Digital Signatures
Digital Certificate Exploitation
Cross Site Scripting (XSS)

The correct answer is: Cross Site Scripting (XSS)

Question 10
Correct

Mark 1.00 out of 1.00

46684
A company wants to securely transfer confidential files between two remote offices. Which technology is suitable for this purpose?

Ingress and Egress


PGP
Hashing
SSH

The correct answer is: SSH

◄ Bases Of Web Technology


46684
Jump to...

Cloud Security - PreQuiz ►

46684

https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1057304&cmid=8050 4/4

You might also like