Search Header Logo

Process of Security Design

Authored by Elankayer Sithirasenan

Professional Development

Professional Development

Used 14+ times

Process of Security Design
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security Domain is

everything valuable to the organization including buildings, equipment, employees etc.

the physical and logical perimeter boundaries of the network

the impact of the threat exploiting the vulnerability

the natural, accidental or intentional vulnerabilities

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following step is not part of a security plan development ?

develop security policies

identify and prioritize network vulnerabilities

conduct risk assessment

develop work-breakdown structure

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is not a security control ?

user access controls

training and awareness

configuration controls

risk assessment

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between a logical and a physical topology ?

logical topology shows one part of the physical topology identifying the network devices and cable layout

physical topology shows the physical locations of devices and cables whereas logical topology shows the logical design on the network

logical topology shows the locations of devices and cables whereas physical topology shows the IP address allocations on the network

none of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attackers who violate computer security for personal gain or inflict malicious damage are called

White hat hackers

Gray hat hackers

Black hat hackers

Purple hat hackers

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

People who steel documents to find and publish sensitive information from within an organization are called

Cyber-criminals

Insiders

Script kiddies

White hats

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The seven steps of 'cyber security chain' in the right order is

Delivery, Exploitation, Reconnaissance, Weaponisation, Installation, Command and control, Action on objectives

Reconnaissance, Weaponisation, Installation, Command and control, Action on objectives, Delivery, Exploitation

Reconnaissance, Weaponisation, Delivery, Exploitation, Installation, Command and control, Action on objectives

Installation, Exploitation, Reconnaissance, Weaponisation, Delivery, Command and control, Action on objectives

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Professional Development