CYBERSECURITY FUNDAMENTALS (CHAPTER 3)

CYBERSECURITY FUNDAMENTALS (CHAPTER 3)

9th - 12th Grade

32 Qs

quiz-placeholder

Similar activities

Networking Basics

Networking Basics

9th - 12th Grade

32 Qs

Wireless Networking

Wireless Networking

9th - 12th Grade

27 Qs

98-367 PT4

98-367 PT4

8th - 12th Grade

27 Qs

006_Gap Analysis1.2

006_Gap Analysis1.2

12th Grade - University

27 Qs

Computer Application Technology Grade 11 Networks

Computer Application Technology Grade 11 Networks

11th Grade

30 Qs

TestOut Quiz CMT+ P/Q

TestOut Quiz CMT+ P/Q

11th Grade - University

30 Qs

007_Zero Trust - CompTIA Security+ SY0-701 - 1.2

007_Zero Trust - CompTIA Security+ SY0-701 - 1.2

12th Grade - University

27 Qs

Computer Networking Review Quiz

Computer Networking Review Quiz

9th Grade

30 Qs

CYBERSECURITY FUNDAMENTALS (CHAPTER 3)

CYBERSECURITY FUNDAMENTALS (CHAPTER 3)

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

NURR (POLIMAS)

Used 8+ times

FREE Resource

32 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is an example of securing devices as part of infrastructure security?

Encrypting a USB drive

Implementing a firewall for the network

Installing antivirus software on endpoints

Applying a security baseline to the operating system

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media security primarily involves protecting physical storage devices like hard drives, USBs, and CDs from unauthorized access.

TRUE

FALSE

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does securing media involve in terms of infrastructure security?

Hardening applications

Encrypting storage devices

Monitoring network traffic

Creating a security policy

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A security topology refers to the physical layout of devices in a network without considering security elements.

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a security topology that provides an added layer of protection by placing certain systems outside the main network but accessible to external users?

Intrusion detection system (IDS)

Demilitarized zone (DMZ)

Antivirus software

Media encryption

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the purpose of intrusion detection systems in infrastructure security?

To block incoming traffic

To detect and report unauthorized access or breaches

To harden applications

To manage security policies

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An intrusion detection system (IDS) is a proactive system designed to prevent attacks from occurring.

TRUE

FALSE

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?