CySA Module 12 - Data Protection and Privacy

CySA Module 12 - Data Protection and Privacy

9th Grade

17 Qs

quiz-placeholder

Similar activities

Computer Network and Wireless Network

Computer Network and Wireless Network

7th Grade - University

18 Qs

Introduction to Cybersecurity Quiz

Introduction to Cybersecurity Quiz

9th Grade - University

15 Qs

Lesson 6: Criminal Use

Lesson 6: Criminal Use

9th - 12th Grade

15 Qs

Understanding Loops in C Programming

Understanding Loops in C Programming

1st Grade - University

15 Qs

Soal Ulangan Internet 8.7

Soal Ulangan Internet 8.7

8th Grade - University

20 Qs

Data Structures Quiz

Data Structures Quiz

9th - 12th Grade

14 Qs

IT QUIZ :D

IT QUIZ :D

9th - 12th Grade

21 Qs

Y10 Computer Literacy

Y10 Computer Literacy

9th Grade

15 Qs

CySA Module 12 - Data Protection and Privacy

CySA Module 12 - Data Protection and Privacy

Assessment

Quiz

Information Technology (IT)

9th Grade

Hard

Created by

Jose Manuel Rios

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network engineer is designing a new subnet to be deployed in the neighboring building that her organization just purchased. She wants to ensure that certain protocols are not allowed to communicate between the existing subnets and the new subnet. Which of the following should the network engineer configure on the router connecting the two buildings?

DAC

ACL

MAC

SID

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would be the result of a user with the IP address of 10.15.30.45 attempting to access a website located at 10.20.30.40 if a router or firewall is located between the two subnets using the extended ACL below? 10 PERMIT IP ANY ANY 20 PERMIT TCP 10.15.30.0 0.0.0.255 10.20.30.0 0.0.0.255 eq 25 20 PERMIT TCP 10.15.30.0 0.0.0.255 10.20.30.0 0.0.0.255 eq 143 30 DENY IP 10.15.30.0 0.0.0.255 10.20.30.0 0.0.0.255 eq 80 40 DENY IP 10.15.30.0 0.0.0.255 10.20.30.0 0.0.0.255 eq 443

Access is permitted

Access is denied

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The user would be able to access email, but not the website.

The user would be able to access email, but not the website.

The user would be able to access the website successfully.

The user would be able to access the HTTP version of the website, but not HTTPS.

The user would be able to access the HTTPS version of the website, but not HTTP.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A consultant is hired to analyze some of the most critical and confidential systems in an organization. Which of the following most likely will be necessary as part of the work?

SLA

NDA

OLA

HIPAA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Justin has just received a report from a security consultant with a line item stating that it is possible that employees potentially could send customer credit card numbers and social security numbers to their personal e-mail addresses and use them to engage in identity theft. Which of the following should Justin consider as a solution to this serious security issue?

IDS

DLP

IPS

NAT

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Faruq is an administrator for a large movie production studio. He has just been sent the mastered version of the latest release, which needs to be available on the company's online rental platform in the near future. Which of the following should he ensure is embedded in the file so that only authorized customers are allowed to watch the movie?

DPO

DRP

Data masking

DRM

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Stan has been tasked with ensuring that his company's data remains secure. As such, he wants to be able to prevent tablets and other devices from accessing certain systems unless the devices are physically on the company's multi-building HQ campus. Which of the following might he decide to implement as a solution?

Geoproximity routing

Geolanding

Geofencing

Geocaching

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?