security cert quiz

study for the security +

Knowledge quiz
Questions 7
Criteria 60% to pass
Difficulty Easy
Play as logged
Get stats, badges and other cool features
(after login you will be redirected back to this page)

Play with friends competition
in real time
Online quiz competitions for the best score
Challenge your friends in real time
Create a competition of this quiz and see who of your friends gets the highest score. Share it, engage your friends and challenge them in real time to get the best score. Learn more about quiz competitions

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:

which of the following malware travels across computer networks and infects computer systems without initiated or executed by a human ?

which audit determines that the user accounts in the organization are assigned properly?

While planning security polices and procedures, it is important to assign who or which groupis responible for which part of the job . this is typically known as:

which of the following are correct about smart card? ( choose 2 best answers)

what is the port number used by imap?

which of the following attacks are most likely to occur as a result of insufficient input calidation on a web based application ? ( choose 3 best answers )

Results of quiz competition


SHARE with your friends

Enter your e-mail and get the opportunityto be notified of the competition results to your e-mail

Your result of the quiz

Your result of the survey


Quiz results

Survey results

Share with friends