Chp 8

Chp 8

9th Grade

10 Qs

quiz-placeholder

Similar activities

KS3 Networks - Intro

KS3 Networks - Intro

7th - 9th Grade

8 Qs

Communication & Networking - Security Measures

Communication & Networking - Security Measures

2nd - 12th Grade

10 Qs

Mini Test 2 (Network Topologies)

Mini Test 2 (Network Topologies)

9th - 11th Grade

12 Qs

Computer Network Connectivity Set-Up Quiz

Computer Network Connectivity Set-Up Quiz

9th Grade

15 Qs

Data Security

Data Security

9th - 10th Grade

15 Qs

Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

8th - 11th Grade

11 Qs

VPN

VPN

9th - 12th Grade

10 Qs

J277 1.4 Network Security Quiz (Threats)

J277 1.4 Network Security Quiz (Threats)

9th - 12th Grade

13 Qs

Chp 8

Chp 8

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Geok Soon Sia

Used 146+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Select all 3 types of information security positions.

definers,

builders,

monitors,

defenders

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

As a security professional, there is a possibility to have access to sensitive data and assets. What is one item a security professional should understand in order to make informed ethical decisions?

partnerships

potential gain

potential bonus

laws governing the data

3.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

An organization has implemented a private cloud infrastructure. In order to secure the infrastructure from potential threats. What three tactics can be implemented to protect the private cloud? (Choose three.)

Hire a consultant.

Test inbound and outbound traffic.

Disable ping, probing, and port scanning.

Update devices with security fixes and patches.

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A company is attempting to lower the cost in deploying commercial software and is considering a cloud based service. Which cloud based service would be best to host the software?

IaaS

PaaS

RaaS

SaaS

5.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What are two potential threats to applications? (Choose two.)

data loss

social engineering

power interruptions

unauthorized access

6.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What three services does CERT provide? (Choose three.)

develop attack tools

resolve software vulnerabilities

develop tools, products, and methods to analyze vulnerabilities

develop tools, products, and methods to conduct forensic examinations

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A school administrator is concerned with the disclosure of student information due to a breach. Under which act is student information protected?

CIPA

COPPA

FERPA

HIPPA

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?