Search Header Logo
Lesson 3

Lesson 3

Assessment

Presentation

Computers

University

Practice Problem

Easy

Created by

Lorie undefined

Used 1+ times

FREE Resource

13 Slides • 9 Questions

1

media

2

media

3

media

4

Multiple Choice

Which of the following is NOT an example of a Defense-in-Depth layer?

1

Physical

2

Network

3

Encryption

4

Strict identity verification

5

media

6

Fill in the Blank

The core principle of Zero Trust Architecture is ___ trust, always verify.

7

media

8

Multiple Choice

Which of the following best describes the concept of Zero Trust Architecture?

1

Assuming all users and devices are trusted by default

2

Trusting only users within the organization

3

Never trusting any user or device, always verifying before granting access

4

Allowing unrestricted access to all resources

9

Multiple Choice

Which of the following is a key difference between Defense-in-Depth and Zero Trust security models?

1

Defense-in-Depth focuses on strict identity verification, while Zero Trust uses layered protection.

2

Defense-in-Depth is a modern security model, while Zero Trust is a traditional model.

3

Defense-in-Depth focuses on barriers, while Zero Trust focuses on identity and access.

4

Defense-in-Depth uses Just-In-Time access, while Zero Trust uses encryption.

10

media

11

media

12

media

13

Multiple Choice

Which of the following are layers commonly found in a layered security model?

1

Physical, Network, Host, Application

2

Encryption, Backups, Awareness Training, Firewalls

3

User, Workstation, LAN, WAN

4

Authentication, Input Validation, Antivirus, Patching

14

media

15

Multiple Select

Select all that apply: Which of the following are examples of security policies?

1

Acceptable Use

2

Password must be at least 12 characters

3

How to reset a password

4

Data Classification Policy

16

Multiple Choice

Which of the following best describes a security policy?

1

A high-level management directive outlining what must be done

2

A step-by-step instruction on how to perform a task

3

A specific requirement supporting a policy

4

A technical tool used for cybersecurity

17

media

18

media

19

media

20

media

21

Fill in the Blank

Good cybersecurity is about good design, multiple layers, strong rules, and responsible ___.

22

Multiple Choice

What is one key difference between Defense-in-Depth and Zero Trust Architecture in information security?

1

Defense-in-Depth relies on multiple layers of security, while Zero Trust assumes no implicit trust within the network.

2

Defense-in-Depth assumes all internal users are trusted, while Zero Trust assumes all external users are trusted.

3

Zero Trust Architecture uses only physical security measures, while Defense-in-Depth uses only digital measures.

4

Defense-in-Depth is only applicable to small organizations, while Zero Trust is for large enterprises.

media

Show answer

Auto Play

Slide 1 / 22

SLIDE