IAS 2 Security Architecture and Design Quiz 3

IAS 2 Security Architecture and Design Quiz 3

University

35 Qs

quiz-placeholder

Similar activities

Information Assurance and Security Quiz

Information Assurance and Security Quiz

University

40 Qs

CPET 18L Pre-Midterm Exam

CPET 18L Pre-Midterm Exam

University

30 Qs

Cybersecurity Formative Assessment

Cybersecurity Formative Assessment

12th Grade - University

34 Qs

Security Assessments

Security Assessments

University

37 Qs

DBMS: Security and Backups

DBMS: Security and Backups

University

34 Qs

Information Assurance and Security Finals Long Test

Information Assurance and Security Finals Long Test

University

30 Qs

IAS - Assignment 3

IAS - Assignment 3

University

40 Qs

акт 8тест

акт 8тест

University

40 Qs

 IAS 2 Security Architecture and Design Quiz 3

IAS 2 Security Architecture and Design Quiz 3

Assessment

Quiz

Computers

University

Easy

Created by

Darwin Vargas

Used 2+ times

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the principle of "least privilege" imply?

A. Users should have access to all resources  

B. Users should have the minimum access necessary to perform their job functions

C. Security should be implemented through hidden mechanisms

D. Security should be based on the user's rank

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a security policy?

A. A set of guidelines for aesthetic design         

B. A document outlining the rules and procedures for protecting assets

C. A software tool for managing security

D. A list of all users and their permissions

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of security design, what does CIA stand for?

A. Confidentiality, Integrity, Availability                             

B. Central Intelligence Agency

C. Confidentiality, Information, Authentication              

D. Control, Integrity, Access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a demilitarized zone (DMZ) in network security?

A. To store backup data                                                        

   B. To host internal company resources

C. To provide an additional layer of security for external-facing services

D. To monitor employee activities

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a firewall?

A. A physical barrier to prevent unauthorized entry

B. A system designed to prevent unauthorized access to or from a private network

C. A software for managing user credentials

D. An encryption technique

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a "honeypot"?

A. A security mechanism that records all network traffic

B. A system designed to attract and trap potential attackers

C. A database of known security threats

D. A method for securing wireless networks

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "asymmetric cryptography" refer to?

A. Cryptography using the same key for encryption and decryption

 

B. Cryptography using different keys for encryption and decryption

C. Cryptography without any keys

D. Cryptography using hash functions

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?