Cybersecurity quiz

Cybersecurity quiz

12th Grade

45 Qs

quiz-placeholder

Similar activities

Web Development Quiz

Web Development Quiz

12th Grade

50 Qs

Bio Final Review

Bio Final Review

9th - 12th Grade

42 Qs

REMEDIAL KEJAR

REMEDIAL KEJAR

12th Grade

45 Qs

Chapter 11 & 12 Test Review

Chapter 11 & 12 Test Review

11th - 12th Grade

41 Qs

Natural Resources (Renewable/NON-Renewable) REG

Natural Resources (Renewable/NON-Renewable) REG

10th - 12th Grade

45 Qs

3rd 9 weeks study guide

3rd 9 weeks study guide

12th Grade

50 Qs

PLTW UNIT 1.1Biomedical Science Review

PLTW UNIT 1.1Biomedical Science Review

11th - 12th Grade

45 Qs

IB SEHS Topic 5 - Skill in Sports

IB SEHS Topic 5 - Skill in Sports

12th Grade

40 Qs

Cybersecurity quiz

Cybersecurity quiz

Assessment

Quiz

Science

12th Grade

Hard

NGSS
MS-ETS1-2, HS-ETS1-3, MS-ETS1-1

+1

Standards-aligned

Created by

hameeduddin syed

Used 3+ times

FREE Resource

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.496 A wet-known organization has been experiencing attacks from APTs. The organization is concerned that custom malware is being created and emailed into the company or installed on USB stocks that are dropped in parking lots. Which of the following is the best defense against this scenario?

A. Configuring signature-based antivirus to update every 30 minutes

B. Enforcing S/MIME for email and automatically encrypting USB drives upon assertion

C Implementing application execution in a sandbox for unknown software

D. Fuzzing new files for vulnerabilities if they are not digitally signed

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.497 A security administrator is seeking a solution to prevent unauthorized access to the internal network. Which of the following security solutions should the administrator choose?

A. MAC filtering

B. Anti-malware

C. Translation gateway

D VPN

Tags

NGSS.MS-ETS1-2

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

NO.498 A security architect is designing the new outbound internet for a small company. The company would like all 50 users to share the same single Internet connection. In addition, users will not be permitted to use social media sites or external email services while at work. Which of the following should be included in this design to satisfy these requirements? (Select TWO).

A. DLP

B. MAC filtering

C NAT

D VPN

E. Content filler

Tags

NGSS.MS-ETS1-1

NGSS.MS-ETS1-2

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.499 A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?

A. Testing input validation on the user input fields

B Performing code signing on company-developed software

C. Performing static code analysis on the software

D. Ensuring secure cookies are used

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.500 Which of the following is the MOST secure but LEAST expensive data destruction method for data that is stored on hard drives?

A. Pulverizing

B Shredding

C. Incinerating

D. Degaussing

Tags

NGSS.MS-ETS1-2

NGSS.MS-ETS1-3

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.501 A security analyst received the following requirements for the deployment of a security camera solution: The cameras must be viewable by the on-site security guards. + The cameras must be able to communicate with the video storage server. The cameras must have the time synchronized automatically. IT Certification Guaranteed, The Easy Way! 233 The cameras must not be reachable directly via the internet. The servers for the cameras and video storage must be available for remote maintenance via the company VPN. Which of the following should the security analyst recommend to securely meet the remote connectivity requirements?

A. Creating firewall rules that prevent outgoing traffic from the subnet the servers and cameras reside on

B Deploying a jump server that is accessible via the internal network that can communicate with the servers

C. Disabling all unused ports on the switch that the cameras are plugged into and enabling MAC filtering

D. Implementing a WAF to allow traffic from the local NTP server to the camera server

Tags

NGSS.MS-ETS1-1

NGSS.MS-ETS1-2

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.502 A government organization is developing an advanced Al defense system. Develop-ers are using information collected from third-party providers Analysts are no-ticing inconsistencies in the expected powers Of then learning and attribute the Outcome to a recent attack on one of the suppliers. Which of the following IS the most likely reason for the inaccuracy of the system?

A. Improper algorithms security

B Tainted training data

C. virus

D. Cryptomalware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?