Cybersecurity quiz

Cybersecurity quiz

12th Grade

45 Qs

quiz-placeholder

Similar activities

7th Grade 1st Semester Final Exam Review

7th Grade 1st Semester Final Exam Review

7th Grade - University

40 Qs

Solubility PRACTICE quiz

Solubility PRACTICE quiz

9th - 12th Grade

41 Qs

Sains SPM 2017 Kertas 1

Sains SPM 2017 Kertas 1

12th Grade

50 Qs

Veins

Veins

9th - 12th Grade

42 Qs

Unit 7 Weather Review 2024

Unit 7 Weather Review 2024

10th - 12th Grade

41 Qs

Interim Review- Energy and Waves (AKS 7 and 9)

Interim Review- Energy and Waves (AKS 7 and 9)

8th - 12th Grade

45 Qs

Enzymes and ATP Review

Enzymes and ATP Review

9th - 12th Grade

40 Qs

Endocrine System Unit: Complete

Endocrine System Unit: Complete

10th - 12th Grade

45 Qs

Cybersecurity quiz

Cybersecurity quiz

Assessment

Quiz

Science

12th Grade

Hard

NGSS
MS-ETS1-2, HS-ETS1-3, MS-ETS1-1

+1

Standards-aligned

Created by

hameeduddin syed

Used 3+ times

FREE Resource

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.496 A wet-known organization has been experiencing attacks from APTs. The organization is concerned that custom malware is being created and emailed into the company or installed on USB stocks that are dropped in parking lots. Which of the following is the best defense against this scenario?

A. Configuring signature-based antivirus to update every 30 minutes

B. Enforcing S/MIME for email and automatically encrypting USB drives upon assertion

C Implementing application execution in a sandbox for unknown software

D. Fuzzing new files for vulnerabilities if they are not digitally signed

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.497 A security administrator is seeking a solution to prevent unauthorized access to the internal network. Which of the following security solutions should the administrator choose?

A. MAC filtering

B. Anti-malware

C. Translation gateway

D VPN

Tags

NGSS.MS-ETS1-2

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

NO.498 A security architect is designing the new outbound internet for a small company. The company would like all 50 users to share the same single Internet connection. In addition, users will not be permitted to use social media sites or external email services while at work. Which of the following should be included in this design to satisfy these requirements? (Select TWO).

A. DLP

B. MAC filtering

C NAT

D VPN

E. Content filler

Tags

NGSS.MS-ETS1-1

NGSS.MS-ETS1-2

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.499 A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?

A. Testing input validation on the user input fields

B Performing code signing on company-developed software

C. Performing static code analysis on the software

D. Ensuring secure cookies are used

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.500 Which of the following is the MOST secure but LEAST expensive data destruction method for data that is stored on hard drives?

A. Pulverizing

B Shredding

C. Incinerating

D. Degaussing

Tags

NGSS.MS-ETS1-2

NGSS.MS-ETS1-3

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.501 A security analyst received the following requirements for the deployment of a security camera solution: The cameras must be viewable by the on-site security guards. + The cameras must be able to communicate with the video storage server. The cameras must have the time synchronized automatically. IT Certification Guaranteed, The Easy Way! 233 The cameras must not be reachable directly via the internet. The servers for the cameras and video storage must be available for remote maintenance via the company VPN. Which of the following should the security analyst recommend to securely meet the remote connectivity requirements?

A. Creating firewall rules that prevent outgoing traffic from the subnet the servers and cameras reside on

B Deploying a jump server that is accessible via the internal network that can communicate with the servers

C. Disabling all unused ports on the switch that the cameras are plugged into and enabling MAC filtering

D. Implementing a WAF to allow traffic from the local NTP server to the camera server

Tags

NGSS.MS-ETS1-1

NGSS.MS-ETS1-2

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.502 A government organization is developing an advanced Al defense system. Develop-ers are using information collected from third-party providers Analysts are no-ticing inconsistencies in the expected powers Of then learning and attribute the Outcome to a recent attack on one of the suppliers. Which of the following IS the most likely reason for the inaccuracy of the system?

A. Improper algorithms security

B Tainted training data

C. virus

D. Cryptomalware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?