Cybersecurity Fundamentals IS100B Skills Check
Skills Check Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the skills check before. Hence you can not start it again.
Skills Check is loading…
You must sign in or sign up to start the skills check.
You must first complete the following:
Results
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 10
1. Question
Which module is responsible for allocating and de-allocating memory space to programs in need of these resources?
-
Question 2 of 10
2. Question
Which Job Title manages the policies and access to secured assets?
-
Question 3 of 10
3. Question
Which bit architecture allows for the possibility of having 17 billion GB of RAM?
-
Question 4 of 10
4. Question
What movie introduced the first published use of “firewall”?
-
Question 5 of 10
5. Question
What year was the first widely publicized Zero-Day attack?
-
Question 6 of 10
6. Question
The origins of __________ can be traced back to a 1987 paper that mentioned that commercial computing requires a focus on data correctness.
-
Question 7 of 10
7. Question
NIST was a response to an Executive Order that requested a __________ to enhance security and resilience of the US critical Infrastructure.
-
Question 8 of 10
8. Question
Which command symbol can be used to separate multiple commands and be abused to commit command injection?
-
Question 9 of 10
9. Question
What type of program is Visual Studio Code?
-
Question 10 of 10
10. Question
What encryption can you enable on Windows Pro that you can’t enable in Home?