Process of Security Design

Process of Security Design

Professional Development

10 Qs

quiz-placeholder

Similar activities

Day 1 Quiz - Introduction to Networking

Day 1 Quiz - Introduction to Networking

Professional Development

8 Qs

AWS Discovery Day (TMU)

AWS Discovery Day (TMU)

Professional Development

15 Qs

Knowledge Series

Knowledge Series

Professional Development

15 Qs

Initial ELPAC Administration and Scoring

Initial ELPAC Administration and Scoring

Professional Development

13 Qs

Warid Postpaid 2

Warid Postpaid 2

Professional Development

10 Qs

Online eBPLS Users Training Quiz (Day 1)

Online eBPLS Users Training Quiz (Day 1)

Professional Development

10 Qs

Warid Postpaid 1

Warid Postpaid 1

Professional Development

10 Qs

Training JICT

Training JICT

Professional Development

10 Qs

Process of Security Design

Process of Security Design

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

Elankayer Sithirasenan

Used 13+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security Domain is

everything valuable to the organization including buildings, equipment, employees etc.

the physical and logical perimeter boundaries of the network

the impact of the threat exploiting the vulnerability

the natural, accidental or intentional vulnerabilities

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following step is not part of a security plan development ?

develop security policies

identify and prioritize network vulnerabilities

conduct risk assessment

develop work-breakdown structure

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is not a security control ?

user access controls

training and awareness

configuration controls

risk assessment

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between a logical and a physical topology ?

logical topology shows one part of the physical topology identifying the network devices and cable layout

physical topology shows the physical locations of devices and cables whereas logical topology shows the logical design on the network

logical topology shows the locations of devices and cables whereas physical topology shows the IP address allocations on the network

none of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attackers who violate computer security for personal gain or inflict malicious damage are called

White hat hackers

Gray hat hackers

Black hat hackers

Purple hat hackers

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

People who steel documents to find and publish sensitive information from within an organization are called

Cyber-criminals

Insiders

Script kiddies

White hats

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The seven steps of 'cyber security chain' in the right order is

Delivery, Exploitation, Reconnaissance, Weaponisation, Installation, Command and control, Action on objectives

Reconnaissance, Weaponisation, Installation, Command and control, Action on objectives, Delivery, Exploitation

Reconnaissance, Weaponisation, Delivery, Exploitation, Installation, Command and control, Action on objectives

Installation, Exploitation, Reconnaissance, Weaponisation, Delivery, Command and control, Action on objectives

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?