Cybersecurity MCQs Quiz

Cybersecurity MCQs Quiz

University

20 Qs

quiz-placeholder

Similar activities

Cloud Architecting - Week 5

Cloud Architecting - Week 5

University

20 Qs

Access to the Cloud

Access to the Cloud

University

15 Qs

Computer Networks

Computer Networks

University

25 Qs

CIS1103 Week 11-12 CLO 5 Security

CIS1103 Week 11-12 CLO 5 Security

University

16 Qs

SAN Module 5 Quiz

SAN Module 5 Quiz

University - Professional Development

15 Qs

Network Security

Network Security

University

20 Qs

Operating System Security Quiz

Operating System Security Quiz

University

20 Qs

Hackers?

Hackers?

University

20 Qs

Cybersecurity MCQs Quiz

Cybersecurity MCQs Quiz

Assessment

Quiz

Computers

University

Easy

Created by

ANIKET PAUL

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main idea behind the Defense in Depth strategy?

Encrypting data at rest only

Using antivirus as the only defense

Creating multiple layers of security

Outsourcing security to third-party providers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of control used in Defense in Depth?

Physical Control

Mental Control

Technical Control

Administrative Control

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a technical control in Defense in Depth?

Lock on a server room door

Employee awareness training

Two-Factor Authentication (2FA)

Security guard patrolling the premises

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of a DMZ (Demilitarized Zone) in network security?

Encrypts email communications

Monitors employee productivity

Acts as a buffer zone between external and internal networks

Blocks access to social media

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which layer is responsible for protecting individual devices like laptops and servers?

Network Layer

Data Layer

Endpoint Security

Application Layer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a benefit of the Zero Trust Security Model?

Assumes everything inside the network is safe

Allows unrestricted access for trusted devices

Requires continuous verification of all resources

Uses only physical security measures

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of Web Application Firewalls (WAFs)?

Encrypt network traffic

Filter data at the physical layer

Protect applications from web-based threats

Monitor VPN traffic

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?