Process of Security Design

Process of Security Design

Professional Development

10 Qs

quiz-placeholder

Similar activities

Pre Test ECAMP

Pre Test ECAMP

Professional Development

10 Qs

How Brands have Transformed Digitally

How Brands have Transformed Digitally

Professional Development

10 Qs

Net+ 01 / 02 Review

Net+ 01 / 02 Review

University - Professional Development

11 Qs

Know Your Company - Round 3

Know Your Company - Round 3

Professional Development

10 Qs

AZ-400 | Mod-1 & 2

AZ-400 | Mod-1 & 2

Professional Development

13 Qs

WCM - Chpt5

WCM - Chpt5

Professional Development

10 Qs

CONDUITE EXPLOITATION 1

CONDUITE EXPLOITATION 1

Professional Development

9 Qs

CSP eCARD7 for ODS

CSP eCARD7 for ODS

Professional Development

10 Qs

Process of Security Design

Process of Security Design

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

Elankayer Sithirasenan

Used 13+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security Domain is

everything valuable to the organization including buildings, equipment, employees etc.

the physical and logical perimeter boundaries of the network

the impact of the threat exploiting the vulnerability

the natural, accidental or intentional vulnerabilities

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following step is not part of a security plan development ?

develop security policies

identify and prioritize network vulnerabilities

conduct risk assessment

develop work-breakdown structure

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is not a security control ?

user access controls

training and awareness

configuration controls

risk assessment

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between a logical and a physical topology ?

logical topology shows one part of the physical topology identifying the network devices and cable layout

physical topology shows the physical locations of devices and cables whereas logical topology shows the logical design on the network

logical topology shows the locations of devices and cables whereas physical topology shows the IP address allocations on the network

none of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attackers who violate computer security for personal gain or inflict malicious damage are called

White hat hackers

Gray hat hackers

Black hat hackers

Purple hat hackers

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

People who steel documents to find and publish sensitive information from within an organization are called

Cyber-criminals

Insiders

Script kiddies

White hats

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The seven steps of 'cyber security chain' in the right order is

Delivery, Exploitation, Reconnaissance, Weaponisation, Installation, Command and control, Action on objectives

Reconnaissance, Weaponisation, Installation, Command and control, Action on objectives, Delivery, Exploitation

Reconnaissance, Weaponisation, Delivery, Exploitation, Installation, Command and control, Action on objectives

Installation, Exploitation, Reconnaissance, Weaponisation, Delivery, Command and control, Action on objectives

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?