Cybersecurity Fundamentals Theory Test 2

Cybersecurity Fundamentals Theory Test 2

University

19 Qs

quiz-placeholder

Similar activities

P3 IAS 2 Quiz

P3 IAS 2 Quiz

University

15 Qs

Getting Familiar with GIT and GITHUB

Getting Familiar with GIT and GITHUB

University

15 Qs

ML Use-Cases Quiz

ML Use-Cases Quiz

University

20 Qs

Database Refreshment

Database Refreshment

University

18 Qs

Introduction to Ethics

Introduction to Ethics

University

14 Qs

Advanced Drone Regulations Quiz

Advanced Drone Regulations Quiz

5th Grade - University

20 Qs

Tavo saugi erdvė internete

Tavo saugi erdvė internete

11th Grade - University

16 Qs

Advance Database Concepts (BSIT 3)

Advance Database Concepts (BSIT 3)

University

20 Qs

Cybersecurity Fundamentals Theory Test 2

Cybersecurity Fundamentals Theory Test 2

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Medium

Created by

ABDUL HAKIM BIN ABDUL AZIZ (PSMZA)

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the following classification of security infrastructure that refers to a structured layout of network security measures that define how different network segments and devices interact to ensure overall protection.

Devices

Media

Security topologies

Intrusion detection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Determine the CORRECT classification of security infrastructure as described in Figure 1.

Security topologies

Intrusion detection

Security baseline

Application hardening

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clarify the following classification of security infrastructure that refers to a minimum set of security standards or configurations that must be implemented across devices, systems, and applications to ensure a consistent security level?

Devices

Security topologies

Security baseline

Application hardening

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Referring to the statement in Figure 2, match the following infrastructure security.

A.   VPN (Virtual Private Network)

B.    IDS (Intrusion Detection System)

C.   Honeypots

D.   DMZ (Demilitarized Zone)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clarify the following that is designed to monitor and detect suspicious activities or breaches within a network or system.

Security topologies

Intrusion detection

Security baseline

Application hardening

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Match the following security tools that are designed to deceive attackers by simulating vulnerable systems or services to detect and analyze unauthorized access attempts.

A.    Firewalls

B.    VPN (Virtual Private Network)

C.   IDS (Intrusion Detection System)

D.   Honeypots

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Referring to the statement in Figure 3, match the following security tools

A.    VPN (Virtual Private Network)

B.    IDS (Intrusion Detection System)

C.   Honeypots

D.   DMZ (Demilitarized Zone)

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?