Cybersecurity MCQs Quiz

Cybersecurity MCQs Quiz

University

20 Qs

quiz-placeholder

Similar activities

Layers Security

Layers Security

University

20 Qs

Security+

Security+

University

15 Qs

Cybersecurity Quiz 1

Cybersecurity Quiz 1

University

20 Qs

Wireless Networking Configuration

Wireless Networking Configuration

University

15 Qs

WLAN SECURITY

WLAN SECURITY

University

20 Qs

Device Hardening

Device Hardening

University

20 Qs

Topic 2.1.2

Topic 2.1.2

University

20 Qs

Cybersecurity Threats and Prevention Quiz

Cybersecurity Threats and Prevention Quiz

9th Grade - University

20 Qs

Cybersecurity MCQs Quiz

Cybersecurity MCQs Quiz

Assessment

Quiz

Computers

University

Easy

Created by

ANIKET PAUL

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main idea behind the Defense in Depth strategy?

Encrypting data at rest only

Using antivirus as the only defense

Creating multiple layers of security

Outsourcing security to third-party providers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of control used in Defense in Depth?

Physical Control

Mental Control

Technical Control

Administrative Control

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a technical control in Defense in Depth?

Lock on a server room door

Employee awareness training

Two-Factor Authentication (2FA)

Security guard patrolling the premises

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of a DMZ (Demilitarized Zone) in network security?

Encrypts email communications

Monitors employee productivity

Acts as a buffer zone between external and internal networks

Blocks access to social media

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which layer is responsible for protecting individual devices like laptops and servers?

Network Layer

Data Layer

Endpoint Security

Application Layer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a benefit of the Zero Trust Security Model?

Assumes everything inside the network is safe

Allows unrestricted access for trusted devices

Requires continuous verification of all resources

Uses only physical security measures

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of Web Application Firewalls (WAFs)?

Encrypt network traffic

Filter data at the physical layer

Protect applications from web-based threats

Monitor VPN traffic

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?