
Process of Security Design
Authored by Elankayer Sithirasenan
Professional Development
Professional Development
Used 14+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Security Domain is
everything valuable to the organization including buildings, equipment, employees etc.
the physical and logical perimeter boundaries of the network
the impact of the threat exploiting the vulnerability
the natural, accidental or intentional vulnerabilities
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following step is not part of a security plan development ?
develop security policies
identify and prioritize network vulnerabilities
conduct risk assessment
develop work-breakdown structure
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is not a security control ?
user access controls
training and awareness
configuration controls
risk assessment
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the difference between a logical and a physical topology ?
logical topology shows one part of the physical topology identifying the network devices and cable layout
physical topology shows the physical locations of devices and cables whereas logical topology shows the logical design on the network
logical topology shows the locations of devices and cables whereas physical topology shows the IP address allocations on the network
none of the above
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Attackers who violate computer security for personal gain or inflict malicious damage are called
White hat hackers
Gray hat hackers
Black hat hackers
Purple hat hackers
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
People who steel documents to find and publish sensitive information from within an organization are called
Cyber-criminals
Insiders
Script kiddies
White hats
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The seven steps of 'cyber security chain' in the right order is
Delivery, Exploitation, Reconnaissance, Weaponisation, Installation, Command and control, Action on objectives
Reconnaissance, Weaponisation, Installation, Command and control, Action on objectives, Delivery, Exploitation
Reconnaissance, Weaponisation, Delivery, Exploitation, Installation, Command and control, Action on objectives
Installation, Exploitation, Reconnaissance, Weaponisation, Delivery, Command and control, Action on objectives
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
12 questions
Anatomy & Physiology L3 Nails
Quiz
•
Professional Development
11 questions
Bootstrap basics review
Quiz
•
Professional Development
10 questions
Operate Scissor Lift
Quiz
•
Professional Development
15 questions
REVISED CODE OF CONDUCT QUIZ BEE
Quiz
•
Professional Development
9 questions
What works in lessons for you?
Quiz
•
Professional Development
10 questions
IBEX A-ISB
Quiz
•
Professional Development
15 questions
Q1 Introduction to Python
Quiz
•
Professional Development
12 questions
Avani Cam Ranh info
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade