Process of Security Design

Quiz
•
Professional Development
•
Professional Development
•
Medium
Elankayer Sithirasenan
Used 13+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Security Domain is
everything valuable to the organization including buildings, equipment, employees etc.
the physical and logical perimeter boundaries of the network
the impact of the threat exploiting the vulnerability
the natural, accidental or intentional vulnerabilities
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following step is not part of a security plan development ?
develop security policies
identify and prioritize network vulnerabilities
conduct risk assessment
develop work-breakdown structure
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is not a security control ?
user access controls
training and awareness
configuration controls
risk assessment
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the difference between a logical and a physical topology ?
logical topology shows one part of the physical topology identifying the network devices and cable layout
physical topology shows the physical locations of devices and cables whereas logical topology shows the logical design on the network
logical topology shows the locations of devices and cables whereas physical topology shows the IP address allocations on the network
none of the above
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Attackers who violate computer security for personal gain or inflict malicious damage are called
White hat hackers
Gray hat hackers
Black hat hackers
Purple hat hackers
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
People who steel documents to find and publish sensitive information from within an organization are called
Cyber-criminals
Insiders
Script kiddies
White hats
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The seven steps of 'cyber security chain' in the right order is
Delivery, Exploitation, Reconnaissance, Weaponisation, Installation, Command and control, Action on objectives
Reconnaissance, Weaponisation, Installation, Command and control, Action on objectives, Delivery, Exploitation
Reconnaissance, Weaponisation, Delivery, Exploitation, Installation, Command and control, Action on objectives
Installation, Exploitation, Reconnaissance, Weaponisation, Delivery, Command and control, Action on objectives
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Workplace Security

Quiz
•
Professional Development
10 questions
Reinforcement Learning

Quiz
•
Professional Development
10 questions
Know Your Company - Round 3

Quiz
•
Professional Development
13 questions
AZ-400 | Mod-1 & 2

Quiz
•
Professional Development
14 questions
Java Collections

Quiz
•
Professional Development
15 questions
AWS Certified Cloud Practitioner

Quiz
•
Professional Development
10 questions
TEST MODUL 2

Quiz
•
Professional Development
10 questions
How Brands have Transformed Digitally

Quiz
•
Professional Development
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade