Level 5 - Security Zones Quiz

Level 5 - Security Zones Quiz

15 Qs

quiz-placeholder

Similar activities

EmnelisteQuizz

EmnelisteQuizz

KG - University

17 Qs

Test Module 1-5

Test Module 1-5

KG - University

18 Qs

NetFun kapittel 1-4 oppsumering

NetFun kapittel 1-4 oppsumering

KG - University

14 Qs

UH TIKOM 8

UH TIKOM 8

KG - University

20 Qs

Networking basics Module 1& 2

Networking basics Module 1& 2

KG - University

15 Qs

Quiz Booth 3

Quiz Booth 3

KG - University

10 Qs

Level 5 - Security Zones Quiz

Level 5 - Security Zones Quiz

Assessment

Quiz

others

Easy

Created by

Eric Jones

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 2 pts

What are the potential problems associated with big data storage? (check all that apply)
A. It's hard to analyze due to the large dataset size.
B. The dataset becomes so large it can no longer be managed.
C. The data is usually stored on insecure devices.
D. The information retrieved from big data isn't useful for businesses

2.

MULTIPLE SELECT QUESTION

30 sec • 2 pts

What are some ways that organizations can store large amounts of data? (Select all that apply)
A. Network Attached Storage (NAS)
B. Storage Area Network (SAN)
C. USB Flash Drives
D. Directly on individual computers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which file transfer protocol uses Secure Shell version 2 (SSH2) to secure data transfers?
A. FTP
B. TFTP
C. SCP
D. SFTP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

On a Windows system, which set of permissions can be set on drives, folders, and files?
A. Share
B. NTFS
C. Both Share and NTFS
D. Neither Share nor NTFS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a recommended hardware security measure?
A. Assign Co-owner share permissions to Everyone.
B. Door locks
C. Allow anonymous logins to the FTP server.
D. Share permissions can be set only on a folder.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a Faraday cage do in terms of security measures?
A. Blocks all electromagnetic emissions
B. Detects and neutralizes harmful malware
C. Acts as a physical barrier to access network cables
D. Encrypts all data transferred within its bounds

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an attack method that uses a USB charging station in public places?
A. Card cloning
B. Skimming
C. Malicious universal serial bus (USB) cable
D. Protected cable distribution

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?