Process of Security Design

Quiz
•
Professional Development
•
Professional Development
•
Medium
Elankayer Sithirasenan
Used 13+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Security Domain is
everything valuable to the organization including buildings, equipment, employees etc.
the physical and logical perimeter boundaries of the network
the impact of the threat exploiting the vulnerability
the natural, accidental or intentional vulnerabilities
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following step is not part of a security plan development ?
develop security policies
identify and prioritize network vulnerabilities
conduct risk assessment
develop work-breakdown structure
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is not a security control ?
user access controls
training and awareness
configuration controls
risk assessment
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the difference between a logical and a physical topology ?
logical topology shows one part of the physical topology identifying the network devices and cable layout
physical topology shows the physical locations of devices and cables whereas logical topology shows the logical design on the network
logical topology shows the locations of devices and cables whereas physical topology shows the IP address allocations on the network
none of the above
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Attackers who violate computer security for personal gain or inflict malicious damage are called
White hat hackers
Gray hat hackers
Black hat hackers
Purple hat hackers
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
People who steel documents to find and publish sensitive information from within an organization are called
Cyber-criminals
Insiders
Script kiddies
White hats
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The seven steps of 'cyber security chain' in the right order is
Delivery, Exploitation, Reconnaissance, Weaponisation, Installation, Command and control, Action on objectives
Reconnaissance, Weaponisation, Installation, Command and control, Action on objectives, Delivery, Exploitation
Reconnaissance, Weaponisation, Delivery, Exploitation, Installation, Command and control, Action on objectives
Installation, Exploitation, Reconnaissance, Weaponisation, Delivery, Command and control, Action on objectives
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Going Self Employed

Quiz
•
Professional Development
10 questions
C8 : La déclaration et la réparation des AT et des MP

Quiz
•
Professional Development
13 questions
WildChina business terms

Quiz
•
Professional Development
15 questions
VLSM

Quiz
•
Professional Development
10 questions
SECURITY AWARENESS

Quiz
•
Professional Development
8 questions
ARGUMENTATION NEGOCIATION_CRN

Quiz
•
Professional Development
10 questions
AWS ACF Módulo 9 - Arquitetura de nuvem

Quiz
•
Professional Development
10 questions
Kuiz Webinar Bicara Etika Siber

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade