CySA Module 12 - Data Protection and Privacy

CySA Module 12 - Data Protection and Privacy

9th Grade

17 Qs

quiz-placeholder

Similar activities

Berfikir Komputasional Grade 9

Berfikir Komputasional Grade 9

9th Grade

15 Qs

Quiz Administrasi Perkantoran

Quiz Administrasi Perkantoran

9th Grade - University

20 Qs

Uji Pengetahuan Teknologi Informasi dan Komunikasi

Uji Pengetahuan Teknologi Informasi dan Komunikasi

9th Grade

20 Qs

Online Privacy Awareness Quiz

Online Privacy Awareness Quiz

7th Grade - University

13 Qs

ULHAR TIK

ULHAR TIK

7th Grade - University

20 Qs

UJI COBA ASESSMENT SUMATIF TENGAH SEMESTER

UJI COBA ASESSMENT SUMATIF TENGAH SEMESTER

9th Grade

20 Qs

ASESMEN SUMATIF TENGAH SEMESTER GANJIL INFORMATIKA KELAS 9

ASESMEN SUMATIF TENGAH SEMESTER GANJIL INFORMATIKA KELAS 9

9th Grade

20 Qs

STP_Integrasi aplikasi

STP_Integrasi aplikasi

9th Grade - University

15 Qs

CySA Module 12 - Data Protection and Privacy

CySA Module 12 - Data Protection and Privacy

Assessment

Quiz

Information Technology (IT)

9th Grade

Hard

Created by

Jose Manuel Rios

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network engineer is designing a new subnet to be deployed in the neighboring building that her organization just purchased. She wants to ensure that certain protocols are not allowed to communicate between the existing subnets and the new subnet. Which of the following should the network engineer configure on the router connecting the two buildings?

DAC

ACL

MAC

SID

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would be the result of a user with the IP address of 10.15.30.45 attempting to access a website located at 10.20.30.40 if a router or firewall is located between the two subnets using the extended ACL below? 10 PERMIT IP ANY ANY 20 PERMIT TCP 10.15.30.0 0.0.0.255 10.20.30.0 0.0.0.255 eq 25 20 PERMIT TCP 10.15.30.0 0.0.0.255 10.20.30.0 0.0.0.255 eq 143 30 DENY IP 10.15.30.0 0.0.0.255 10.20.30.0 0.0.0.255 eq 80 40 DENY IP 10.15.30.0 0.0.0.255 10.20.30.0 0.0.0.255 eq 443

Access is permitted

Access is denied

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The user would be able to access email, but not the website.

The user would be able to access email, but not the website.

The user would be able to access the website successfully.

The user would be able to access the HTTP version of the website, but not HTTPS.

The user would be able to access the HTTPS version of the website, but not HTTP.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A consultant is hired to analyze some of the most critical and confidential systems in an organization. Which of the following most likely will be necessary as part of the work?

SLA

NDA

OLA

HIPAA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Justin has just received a report from a security consultant with a line item stating that it is possible that employees potentially could send customer credit card numbers and social security numbers to their personal e-mail addresses and use them to engage in identity theft. Which of the following should Justin consider as a solution to this serious security issue?

IDS

DLP

IPS

NAT

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Faruq is an administrator for a large movie production studio. He has just been sent the mastered version of the latest release, which needs to be available on the company's online rental platform in the near future. Which of the following should he ensure is embedded in the file so that only authorized customers are allowed to watch the movie?

DPO

DRP

Data masking

DRM

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Stan has been tasked with ensuring that his company's data remains secure. As such, he wants to be able to prevent tablets and other devices from accessing certain systems unless the devices are physically on the company's multi-building HQ campus. Which of the following might he decide to implement as a solution?

Geoproximity routing

Geolanding

Geofencing

Geocaching

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?