CYBER SECURITY

CYBER SECURITY

KG

10 Qs

quiz-placeholder

Similar activities

ABRAHAM MASLOW

ABRAHAM MASLOW

7th Grade

10 Qs

HSE QUIZ Q2 2023

HSE QUIZ Q2 2023

Professional Development

15 Qs

Adopt me roblox quiz by stupidelephant911

Adopt me roblox quiz by stupidelephant911

KG - Professional Development

11 Qs

Kulwap SDPD

Kulwap SDPD

KG - Professional Development

14 Qs

Security Awareness Level 4

Security Awareness Level 4

Professional Development

10 Qs

INFOSEC WEEK DAY 1

INFOSEC WEEK DAY 1

1st Grade - Professional Development

10 Qs

Hurricanes

Hurricanes

10th Grade

10 Qs

Drug For Anti-Hypertension

Drug For Anti-Hypertension

University

11 Qs

CYBER SECURITY

CYBER SECURITY

Assessment

Quiz

Other

KG

Hard

Created by

Guiller Roque

Used 169+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

preventative techniques used to protect the integrity of

networks, programs and data from attack, damage,

or unauthorized access.

Firewall

Cybersecurity

SIEM

Anti-DDos

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Give at least 3 types of attack vectors

Social Network

USB

Mobile Device

Printer

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Consequences of an information security breach

vandalism

Revenue lost

Damage Intellectual Property

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Provides you a capability to grant or reject network

access to traffic flows between an untrusted zone (e.g.,

the Internet) and a trusted zone (e.g., a private or

corporate network).

VPN

End point security

firewall/UTM

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Delivers on-premise, in-line, DDoS protection powered by

automated DDoS detection and mitigation capabilities

ZIA

ZPA

Anti-DDOS

None of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Manage and secure your company over threats coming

from Mobile devices, regardless of device ownership

whether it is company-owned or BYOD.

Cybersecurity

End point security

Mobile Threat Protection

Manage Firewall

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cybersecurity product that offers Anti-virus, Antispyware, host intrusion prevention, application control, device control, and network access control

Endpoint Security

Firewall / UTM

SIEM

None of the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?