Basic Securities Quiz

Basic Securities Quiz

12th Grade

14 Qs

quiz-placeholder

Similar activities

AP CK Cybersecurity Unit 2

AP CK Cybersecurity Unit 2

12th Grade

10 Qs

Sandbox

Sandbox

12th Grade

15 Qs

J277 - 1.4 - Network Threats

J277 - 1.4 - Network Threats

10th Grade - University

16 Qs

Unit 5 Quiz

Unit 5 Quiz

9th - 12th Grade

10 Qs

Networks Security 6.1

Networks Security 6.1

10th - 12th Grade

10 Qs

Internet Gateway dan NAT

Internet Gateway dan NAT

12th Grade

11 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

Review ( Security )

Review ( Security )

12th Grade

16 Qs

Basic Securities Quiz

Basic Securities Quiz

Assessment

Quiz

Computers

12th Grade

Hard

Created by

nur idaw undefined

Used 1+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the four types of threats that may arise after a threat actor gains access to a network?

Data Breach, System Failure, Unauthorized Access, Network Disruption

Phishing, Ransomware, DDoS, Malware

Information Theft, Data Loss and Manipulation, Identity Theft, Disruption of Service

Firewall Breach, Endpoint Security, Password Leak, Physical Damage

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three primary vulnerabilities or weaknesses in a network or device?

Data Vulnerabilities, Identity Vulnerabilities, Service Vulnerabilities

Technological Vulnerabilities, Configuration Vulnerabilities, Security Policy Vulnerabilities

Hardware Vulnerabilities, Software Vulnerabilities, Network Vulnerabilities

Physical Vulnerabilities, Environmental Vulnerabilities, Electrical Vulnerabilities

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the four classes of physical threats that can compromise network resources?

Software threats, Network threats, Data threats, Identity threats

Phishing threats, Malware threats, DDoS threats, Ransomware threats

Hardware threats, Environmental threats, Electrical threats, Maintenance threats

Firewall threats, Endpoint threats, Password threats, Physical threats

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware and what are the types?

Malware is a type of vulnerability, Types include Technological, Configuration, and Security Policy

Malware is a type of network attack, Types include Reconnaissance, Access, and Denial of Service

Malware is a type of hardware, Types include Phishing, Ransomware, and DDoS

Malware is malicious software, Types include Viruses, Worms, and Trojan Horses

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three major categories of network attacks?

Firewall, Endpoint Security, Password Leak

Reconnaissance, Access, Denial of Service

Phishing, Malware, DDoS

Physical Damage, Environmental Threats, Electrical Vulnerabilities

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the defense-in-depth approach to security and what devices are mentioned for protection?

A layered approach to security, Devices include VPN, ASA Firewall, IPS, ESA/WSA, AAA Server

A single-layered approach to security, Devices include Antivirus, Firewall, Encryption, Intrusion Detection

A reactive approach to security, Devices include Backup, Update, Patch, Authentication

A preventive approach to security, Devices include Physical Security, Network Attacks, Endpoint Security, Device Security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to keep backups of device configurations and data?

To save storage space, To prevent unauthorized access, To protect against data loss, To improve network speed

To enhance device performance, To comply with regulations, To simplify troubleshooting, To reduce network traffic

To limit access control, To encourage data breaches, To ignore security policies, To overlook system vulnerabilities

To increase security risks, To complicate network management, To slow down network operations, To confuse network administrators

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?