Security Controls Quiz

Security Controls Quiz

10th Grade

18 Qs

quiz-placeholder

Similar activities

Latihan Soal DDTJKT

Latihan Soal DDTJKT

10th Grade

20 Qs

S2 Microsoft Access Database Quiz

S2 Microsoft Access Database Quiz

10th Grade - University

15 Qs

Unit 2: Securing Servers and Devices

Unit 2: Securing Servers and Devices

9th - 12th Grade

15 Qs

Lesson 4: User Access Policy

Lesson 4: User Access Policy

9th - 12th Grade

15 Qs

Software Quiz

Software Quiz

10th Grade

13 Qs

CN Jan 2025 2

CN Jan 2025 2

10th Grade

15 Qs

Section 1.1 Security Introduction

Section 1.1 Security Introduction

10th Grade

15 Qs

Business Security Assessment for 9th Grade

Business Security Assessment for 9th Grade

8th Grade - University

20 Qs

Security Controls Quiz

Security Controls Quiz

Assessment

Quiz

Information Technology (IT)

10th Grade

Medium

Created by

Kari Cobb

Used 1+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of security control aims to keep people out of systems and prevent attacks?

Deterrent

Corrective

Preventive

Detective

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a deterrent security control?

Intrusion detection system

Firewall rule configurations

Security awareness training

Warning signs like "No Trespassing"

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security control type is designed to alert you when a particular event occurs, such as an unauthorized user accessing a system?

Preventive

Deterrent

Detective

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security control type is put in place to satisfy the requirement for a security measure deemed too difficult or impractical to implement now?

Corrective

Compensating

Directive

Deterrent

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three fundamental principles of information security, also known as the CIA Triad?

Confidentiality, Integrity, and Authorization

Confidentiality, Integrity, and Availability

Confidentiality, Integrity, and Access Control

Confidentiality, Integrity, and Authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Zero Trust approach to network security emphasize?

Implicit trust zones based on network perimeter defenses.

Trusting all users and devices within the network perimeter.

Continuous evaluation of access requests and granting only minimum necessary permissions.

Providing broad access privileges to users once inside the network.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a physical security control that channels people through a specific point while prohibiting vehicle access?

Access Badge

Fences and Signs

Video Surveillance

Access Control Vestibule

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?