
CYBER SECURITY
Authored by Guiller Roque
Other
KG
Used 169+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
preventative techniques used to protect the integrity of
networks, programs and data from attack, damage,
or unauthorized access.
Firewall
Cybersecurity
SIEM
Anti-DDos
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Give at least 3 types of attack vectors
Social Network
USB
Mobile Device
Printer
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Consequences of an information security breach
vandalism
Revenue lost
Damage Intellectual Property
All of the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Provides you a capability to grant or reject network
access to traffic flows between an untrusted zone (e.g.,
the Internet) and a trusted zone (e.g., a private or
corporate network).
VPN
End point security
firewall/UTM
All of the above
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Delivers on-premise, in-line, DDoS protection powered by
automated DDoS detection and mitigation capabilities
ZIA
ZPA
Anti-DDOS
None of the above
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Manage and secure your company over threats coming
from Mobile devices, regardless of device ownership
whether it is company-owned or BYOD.
Cybersecurity
End point security
Mobile Threat Protection
Manage Firewall
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cybersecurity product that offers Anti-virus, Antispyware, host intrusion prevention, application control, device control, and network access control
Endpoint Security
Firewall / UTM
SIEM
None of the above
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?