Professional Documents
Culture Documents
Operations Security and Cryptography - Bases of Web Technology - PostQuiz - Attempt Review
Operations Security and Cryptography - Bases of Web Technology - PostQuiz - Attempt Review
Dashboard / Primer 2.0 - Infrastructure Security / Stage 1 / Security & Cybersecurity fundamentals
Quiz review
Started on Wednesday, 24 January 2024, 11:41 PM
State Finished
Completed on Wednesday, 24 January 2024, 11:46 PM
Time taken 4 mins 16 secs
Marks 8.00/10.00
Grade 80.00 out of 100.00
Question 1
Correct
46684
An email needs to be sent securely, and the sender wants to ensure the recipient can verify the email's origin and integrity. Which technology should be
used?
SQL Injection
SSL
Digital Signatures
Symmetric Encryption
Question 2
Incorrect
46684
Mark 0.00 out of 1.00
A user suspects that their password was compromised due to a website vulnerability. What security threat might they be a victim of?
https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1057304&cmid=8050 1/4
1/24/24, 11:46 PM Operations Security and Cryptography - Bases of Web Technology - PostQuiz: Attempt review
Question 3
Correct
An organization needs to monitor and analyze its network traffic for security incidents and breaches. What type of system should they use?
Symmetric Encryption
SEM (Security Event Management) & SIEM (Security Information and Event Management)
Data Loss Prevention Software
Public Key Encryption
The correct answer is: SEM (Security Event Management) & SIEM (Security Information and Event Management)
Question 4
Correct
46684
A user receives an email claiming to be from a trusted source, but they are unsure if it's genuine. What technology can help verify the email's authenticity?
Question 5
Correct
46684
Mark 1.00 out of 1.00
An organization needs to protect sensitive data stored in a database. What security measure should they implement to prevent unauthorized access?
https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1057304&cmid=8050 2/4
1/24/24, 11:46 PM Operations Security and Cryptography - Bases of Web Technology - PostQuiz: Attempt review
Question 6
Correct
A company wants to ensure the privacy and security of emails sent within the organization. What technology should they consider implementing?
IPSec
Logging
SSL
S/MIME
Question 7
Correct
46684
A company wants to secure its internal communications and data transfers over the internet. What technology can help achieve this goal?
SQL Injection
Symmetric Encryption
SSL
IPSec
Question 8
Incorrect
46684
Mark 0.00 out of 1.00
A company wants to ensure that only authorized personnel can access its internal network. What technology should they implement?
Digital Certificates
Public Key Encryption
Secure Shell (SSH)
IPSec
https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1057304&cmid=8050 3/4
1/24/24, 11:46 PM Operations Security and Cryptography - Bases of Web Technology - PostQuiz: Attempt review
Question 9
Correct
A website is vulnerable to malicious code injection, allowing attackers to steal sensitive data. What type of attack is this?
IP Spoofing
Digital Signatures
Digital Certificate Exploitation
Cross Site Scripting (XSS)
Question 10
Correct
46684
A company wants to securely transfer confidential files between two remote offices. Which technology is suitable for this purpose?
46684
https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1057304&cmid=8050 4/4