CyberSecurity Essentials Module 1

CyberSecurity Essentials Module 1

10th - 12th Grade

5 Qs

quiz-placeholder

Similar activities

FUTURE 1 - will/going to/present continuous

FUTURE 1 - will/going to/present continuous

11th - 12th Grade

10 Qs

Quiz on Freedom fighters

Quiz on Freedom fighters

8th - 12th Grade

10 Qs

Plants

Plants

12th Grade

10 Qs

ASSESMENT DIAGNOSTIC

ASSESMENT DIAGNOSTIC

12th Grade

10 Qs

ucsp week 7 recall

ucsp week 7 recall

11th Grade

10 Qs

THE BLACK AEROPLANE

THE BLACK AEROPLANE

10th Grade

10 Qs

WB B2 1a

WB B2 1a

11th Grade

10 Qs

PR 2 quiz 2

PR 2 quiz 2

12th Grade

10 Qs

CyberSecurity Essentials Module 1

CyberSecurity Essentials Module 1

Assessment

Quiz

10th - 12th Grade

Practice Problem

Hard

Created by

LaKeisha Carter

Used 24+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A Zero Trust network security model is based on which security principle?

non-repudiation

Due diligence

Least privilege

negative control

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which capability of a Zero-Trust segmentation platform uses a combination of anti-malware, intrusion prevention, and cyberthreat prevention technologies to provide comprehensive protection against both known and unknown threats, including threats on mobile devices?

Inspection of all traffic

Secure access

Least privilege access control

Cyberthreat protection

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The primary issue with a perimeter-based network security strategy in which countermeasures are deployed at a handful of well-defined ingress and egress points to the network is that it relies on the assumption that everything on the internal network can be trusted.

True

False

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is not a benefit of implementing a Zero-Trust network?

Greater efficiency for achieving and maintaining compliance with security and privacy mandates.

Higher total cost of ownership (TCO) with a consolidated and fully integrated security operating platform.

Improved ability to securely enable transformative IT initiatives.

Clearly improved effectiveness in mitigating data loss with visibility and safe enablement of applications.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The principle of least privilege in network security requires that only the permission or access rights necessary to perform an authorized task is denied.

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?