ISOM

ISOM

University

60 Qs

quiz-placeholder

Similar activities

NCM 110: NURSING INFORMATICS PRELIMS

NCM 110: NURSING INFORMATICS PRELIMS

University

64 Qs

IPT-QUIZ1

IPT-QUIZ1

University

65 Qs

THE ULTIMATE  ITEC 101 MIDTERM REVIEWER

THE ULTIMATE ITEC 101 MIDTERM REVIEWER

University

64 Qs

Intelligence and Secret Service Definition of Terms

Intelligence and Secret Service Definition of Terms

University

64 Qs

EC19P83 - Introduction to IoT

EC19P83 - Introduction to IoT

University

65 Qs

OS Quiz 1 KCS-401

OS Quiz 1 KCS-401

University

61 Qs

Assessment - 1 Basic

Assessment - 1 Basic

University

60 Qs

INFO 232 / COMP 351 - CH 1

INFO 232 / COMP 351 - CH 1

University

57 Qs

ISOM

ISOM

Assessment

Quiz

Other

University

Easy

Created by

Sherly Escandor

Used 1+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of Enterprise Cybersecurity Architecture (ECA)?

Maximizing system performance

Aligning security principles with business objectives

Increasing software development speed

Reducing network latency

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is risk management a critical part of cybersecurity architecture?

It focuses only on compliance requirements

It eliminates all cybersecurity risks

It identifies, assesses, and mitigates security risks proactively

It replaces the need for security policies

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of Intrusion Detection Systems (IDS)?

Blocking unauthorized access

Detecting and alerting security incidents

Encrypting all network data

Replacing firewalls

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the benefit of using a Virtual Private Network (VPN)?

It speeds up data transfer rates

It provides an additional security layer for remote access

It eliminates all cyber threats

It acts as a substitute for endpoint security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which endpoint security measure helps detect anomalies in device behavior?

Firewall rules

Behavioral analytics

Secure web gateways

VPN encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of encryption?

Preventing malware attacks

Ensuring data confidentiality

Increasing data storage efficiency

Enhancing internet speed

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does tokenization differ from encryption?

It replaces sensitive data with a unique identifier

It uses symmetric key algorithms

It permanently scrambles the data

It slows down data access

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?