Cybersecurity Fundamentals Theory Test 2

Cybersecurity Fundamentals Theory Test 2

University

19 Qs

quiz-placeholder

Similar activities

Introduction to Cybersecurity Quiz

Introduction to Cybersecurity Quiz

9th Grade - University

15 Qs

Network Security Quiz

Network Security Quiz

University

20 Qs

ISP and Data Packets Part 2

ISP and Data Packets Part 2

University

15 Qs

Networking Administrator (WEEK 9)

Networking Administrator (WEEK 9)

University

20 Qs

ICT and Multimedia Quiz

ICT and Multimedia Quiz

12th Grade - University

14 Qs

OSS (QUIZ 8) Security and Protection

OSS (QUIZ 8) Security and Protection

University

15 Qs

NET102:  Quiz No. 1

NET102: Quiz No. 1

University

20 Qs

Cybersecurity Fundamentals Theory Test 2

Cybersecurity Fundamentals Theory Test 2

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

ABDUL HAKIM BIN ABDUL AZIZ (PSMZA)

Used 3+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the following classification of security infrastructure that refers to a structured layout of network security measures that define how different network segments and devices interact to ensure overall protection.

Devices

Media

Security topologies

Intrusion detection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Determine the CORRECT classification of security infrastructure as described in Figure 1.

Security topologies

Intrusion detection

Security baseline

Application hardening

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clarify the following classification of security infrastructure that refers to a minimum set of security standards or configurations that must be implemented across devices, systems, and applications to ensure a consistent security level?

Devices

Security topologies

Security baseline

Application hardening

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Referring to the statement in Figure 2, match the following infrastructure security.

A.   VPN (Virtual Private Network)

B.    IDS (Intrusion Detection System)

C.   Honeypots

D.   DMZ (Demilitarized Zone)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clarify the following that is designed to monitor and detect suspicious activities or breaches within a network or system.

Security topologies

Intrusion detection

Security baseline

Application hardening

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Match the following security tools that are designed to deceive attackers by simulating vulnerable systems or services to detect and analyze unauthorized access attempts.

A.    Firewalls

B.    VPN (Virtual Private Network)

C.   IDS (Intrusion Detection System)

D.   Honeypots

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Referring to the statement in Figure 3, match the following security tools

A.    VPN (Virtual Private Network)

B.    IDS (Intrusion Detection System)

C.   Honeypots

D.   DMZ (Demilitarized Zone)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?