Cybersecurity Fundamentals Theory Test 2

Cybersecurity Fundamentals Theory Test 2

University

19 Qs

quiz-placeholder

Similar activities

NISS-DC-Quiz

NISS-DC-Quiz

University

15 Qs

Cybersecurity Knowlege assessment

Cybersecurity Knowlege assessment

University

24 Qs

Introduction to Cybersecurity Quiz

Introduction to Cybersecurity Quiz

9th Grade - University

15 Qs

Security Fundamental

Security Fundamental

University

20 Qs

Cyber Offences Quiz

Cyber Offences Quiz

University

20 Qs

CA Internet

CA Internet

University

20 Qs

Q6. Cybersecurity Best Practices

Q6. Cybersecurity Best Practices

University

15 Qs

Test

Test

University

15 Qs

Cybersecurity Fundamentals Theory Test 2

Cybersecurity Fundamentals Theory Test 2

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

ABDUL HAKIM BIN ABDUL AZIZ (PSMZA)

Used 3+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the following classification of security infrastructure that refers to a structured layout of network security measures that define how different network segments and devices interact to ensure overall protection.

Devices

Media

Security topologies

Intrusion detection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Determine the CORRECT classification of security infrastructure as described in Figure 1.

Security topologies

Intrusion detection

Security baseline

Application hardening

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clarify the following classification of security infrastructure that refers to a minimum set of security standards or configurations that must be implemented across devices, systems, and applications to ensure a consistent security level?

Devices

Security topologies

Security baseline

Application hardening

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Referring to the statement in Figure 2, match the following infrastructure security.

A.   VPN (Virtual Private Network)

B.    IDS (Intrusion Detection System)

C.   Honeypots

D.   DMZ (Demilitarized Zone)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clarify the following that is designed to monitor and detect suspicious activities or breaches within a network or system.

Security topologies

Intrusion detection

Security baseline

Application hardening

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Match the following security tools that are designed to deceive attackers by simulating vulnerable systems or services to detect and analyze unauthorized access attempts.

A.    Firewalls

B.    VPN (Virtual Private Network)

C.   IDS (Intrusion Detection System)

D.   Honeypots

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Referring to the statement in Figure 3, match the following security tools

A.    VPN (Virtual Private Network)

B.    IDS (Intrusion Detection System)

C.   Honeypots

D.   DMZ (Demilitarized Zone)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)