Cybersecurity Fundamentals IS100B Skills Check
Skills Check Summary
0 of 10 Questions completed
You have already completed the skills check before. Hence you can not start it again.
Skills Check is loading…
You must sign in or sign up to start the skills check.
You must first complete the following:
0 of 10 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Which module is responsible for allocating and de-allocating memory space to programs in need of these resources?
Which Job Title manages the policies and access to secured assets?
Which bit architecture allows for the possibility of having 17 billion GB of RAM?
What movie introduced the first published use of “firewall”?
What year was the first widely publicized Zero-Day attack?
The origins of __________ can be traced back to a 1987 paper that mentioned that commercial computing requires a focus on data correctness.
NIST was a response to an Executive Order that requested a __________ to enhance security and resilience of the US critical Infrastructure.
Which command symbol can be used to separate multiple commands and be abused to commit command injection?
What type of program is Visual Studio Code?
What encryption can you enable on Windows Pro that you can’t enable in Home?