CyberSecurity Essentials Module 1

CyberSecurity Essentials Module 1

10th - 12th Grade

5 Qs

quiz-placeholder

Similar activities

ucsp week 7 recall

ucsp week 7 recall

11th Grade

10 Qs

THE BLACK AEROPLANE

THE BLACK AEROPLANE

10th Grade

10 Qs

PR 2 quiz 2

PR 2 quiz 2

12th Grade

10 Qs

BI-YEAR 1

BI-YEAR 1

1st - 10th Grade

10 Qs

FUTURE 1 - will/going to/present continuous

FUTURE 1 - will/going to/present continuous

11th - 12th Grade

10 Qs

Quiz on Freedom fighters

Quiz on Freedom fighters

8th - 12th Grade

10 Qs

Plants

Plants

12th Grade

10 Qs

ASSESMENT DIAGNOSTIC

ASSESMENT DIAGNOSTIC

12th Grade

10 Qs

CyberSecurity Essentials Module 1

CyberSecurity Essentials Module 1

Assessment

Quiz

10th - 12th Grade

Practice Problem

Hard

Created by

LaKeisha Carter

Used 24+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A Zero Trust network security model is based on which security principle?

non-repudiation

Due diligence

Least privilege

negative control

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which capability of a Zero-Trust segmentation platform uses a combination of anti-malware, intrusion prevention, and cyberthreat prevention technologies to provide comprehensive protection against both known and unknown threats, including threats on mobile devices?

Inspection of all traffic

Secure access

Least privilege access control

Cyberthreat protection

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The primary issue with a perimeter-based network security strategy in which countermeasures are deployed at a handful of well-defined ingress and egress points to the network is that it relies on the assumption that everything on the internal network can be trusted.

True

False

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is not a benefit of implementing a Zero-Trust network?

Greater efficiency for achieving and maintaining compliance with security and privacy mandates.

Higher total cost of ownership (TCO) with a consolidated and fully integrated security operating platform.

Improved ability to securely enable transformative IT initiatives.

Clearly improved effectiveness in mitigating data loss with visibility and safe enablement of applications.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The principle of least privilege in network security requires that only the permission or access rights necessary to perform an authorized task is denied.

True

False