IAs1-Quiz No.2 (final term)

IAs1-Quiz No.2 (final term)

University

10 Qs

quiz-placeholder

Similar activities

Network Architecture

Network Architecture

University

14 Qs

ELEC 4- PROFESSIONAL ELECTIVE 4_Web Frameworks Quiz

ELEC 4- PROFESSIONAL ELECTIVE 4_Web Frameworks Quiz

University

10 Qs

Cloud Computing_EXAM_1_ON_1-AUG-2024

Cloud Computing_EXAM_1_ON_1-AUG-2024

University

15 Qs

Basic of Cloud Computing

Basic of Cloud Computing

University

15 Qs

Network devices

Network devices

University

10 Qs

Mitigating Threats

Mitigating Threats

University

12 Qs

CH 12- Defense in Depth

CH 12- Defense in Depth

University

10 Qs

Internet of Things - MQ1

Internet of Things - MQ1

University

15 Qs

IAs1-Quiz No.2 (final term)

IAs1-Quiz No.2 (final term)

Assessment

Quiz

Computers

University

Easy

Created by

PERCIVAL ADAO

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In security architecture, what is the number two approach of most security personnel carrying out the security process?

Develop acrchitecture

Steblsih objectives

Determine approach

Review and revise

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a good security architecture, which of the given choices does not belong to the three components?

Standars and frameworks

Network and security

People, policies and procedures

Data privacy

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the most often overlooked to consider as a vital component of a cybersecurity architecture?

People

Network security

Standard policies

Security weaknesses

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is not only legally required but also a great way to improve your organization’s overall cyber hygiene?

People

Network security

Standard and framework

Security weaknesses

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Network topologies among nodes such as point-to-point, circular, chain, and hybrid are one of the elements of...

People

Network and security

Standards and frameworks

Security weaknesses

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

It guides IT professionals in dealing with security breaches and disaster recovery with a detailed plan that allows business processes to resume or continue despite a security incident.

Security Protocols

Network and security

Standards and frameworks

Security weaknesses

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security architecture must protect the whole IT infrastructure. As such, it should detail who can access sensitive data and who cannot.

Security Protocols

Security roles and their responsibilities

Standards and frameworks

Account creation and management

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?