Assets and Threats: Quiz 2

Assets and Threats: Quiz 2

Professional Development

18 Qs

quiz-placeholder

Similar activities

CYBER SECURITY

CYBER SECURITY

Professional Development

20 Qs

Encryption

Encryption

Professional Development

15 Qs

Cyber Security

Cyber Security

5th Grade - Professional Development

20 Qs

Sec+ | 1.4 Encryptions | 701

Sec+ | 1.4 Encryptions | 701

Professional Development

20 Qs

SAN Module 5 Quiz

SAN Module 5 Quiz

University - Professional Development

15 Qs

Part 4.1

Part 4.1

Professional Development

20 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

20 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Assets and Threats: Quiz 2

Assets and Threats: Quiz 2

Assessment

Quiz

Computers

Professional Development

Hard

Created by

John Coder

FREE Resource

18 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What you need to understand is that protecting data depends on where that data is and what it's doing. Security teams protect data in three different states: in u______, in tra________, and at re________.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Data in ? is data being accessed by one or more users. Imagine being at a park with your laptop

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Data in ? is data traveling from one point to another. While you're signed into your account, a message from one of your friends appears. They sent you an interesting article about the growing security industry. You decide to reply, thanking them for sending this to you. When you click send, this is now an example of data in ?.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Data at ? is data not currently being accessed. In this state, data is typically stored on a physical device. An example of data at ?would be when you finish checking your email and close your laptop. You then decide to pack up and go to a nearby cafe for breakfast. As you make your way from the park towards the cafe, the data in your laptop is at ?.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

There are three main categories of cloud-based services:

sof___________as a service (SaaS)

pla____________ as a service (PaaS)

infra_____________ as a service (IaaS)

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

???? refers to front-end applications that users access via a web browser. The service providers host, manage, and maintain all of the back-end systems for those applications. Common examples of ???? services include applications like Gmail™ email service, Slack, and Zoom software.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

???? refers to back-end application development tools that clients can access online. Developers use these resources to write code and build, manage, and deploy their own apps. Meanwhile, the cloud service providers host and maintain the back-end hardware and software that the apps use to operate. Some examples of ???? services include Google App Engine™ platform, Heroku®, and VMware Cloud Foundry.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?