Security Controls Quiz

Security Controls Quiz

10th Grade

18 Qs

quiz-placeholder

Similar activities

Computer Network and Wireless Network

Computer Network and Wireless Network

7th Grade - University

18 Qs

JARINGAN KOMPUTER DAN INTERNET - KELAS X - INFORMATIKA SEMESTER

JARINGAN KOMPUTER DAN INTERNET - KELAS X - INFORMATIKA SEMESTER

10th Grade

15 Qs

Exploring Computer Network Models

Exploring Computer Network Models

10th Grade - University

13 Qs

Section 1.1 Security Introduction

Section 1.1 Security Introduction

10th Grade

15 Qs

ICS Total Recall Review

ICS Total Recall Review

10th Grade

20 Qs

Lesson 6: Criminal Use

Lesson 6: Criminal Use

9th - 12th Grade

15 Qs

Lesson 2: Internal Threats and Impacts

Lesson 2: Internal Threats and Impacts

9th - 12th Grade

15 Qs

CM- U1L3 -  Windows OS Security Features

CM- U1L3 - Windows OS Security Features

10th Grade - University

20 Qs

Security Controls Quiz

Security Controls Quiz

Assessment

Quiz

Information Technology (IT)

10th Grade

Medium

Created by

Kari Cobb

Used 1+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of security control aims to keep people out of systems and prevent attacks?

Deterrent

Corrective

Preventive

Detective

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a deterrent security control?

Intrusion detection system

Firewall rule configurations

Security awareness training

Warning signs like "No Trespassing"

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security control type is designed to alert you when a particular event occurs, such as an unauthorized user accessing a system?

Preventive

Deterrent

Detective

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security control type is put in place to satisfy the requirement for a security measure deemed too difficult or impractical to implement now?

Corrective

Compensating

Directive

Deterrent

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three fundamental principles of information security, also known as the CIA Triad?

Confidentiality, Integrity, and Authorization

Confidentiality, Integrity, and Availability

Confidentiality, Integrity, and Access Control

Confidentiality, Integrity, and Authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Zero Trust approach to network security emphasize?

Implicit trust zones based on network perimeter defenses.

Trusting all users and devices within the network perimeter.

Continuous evaluation of access requests and granting only minimum necessary permissions.

Providing broad access privileges to users once inside the network.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a physical security control that channels people through a specific point while prohibiting vehicle access?

Access Badge

Fences and Signs

Video Surveillance

Access Control Vestibule

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?