Cyber II | M3 L9: Physical Security Controls by Mr. B

Cyber II | M3 L9: Physical Security Controls by Mr. B

12th Grade

20 Qs

quiz-placeholder

Similar activities

Cyber security

Cyber security

9th - 12th Grade

20 Qs

BTEC IT Level 3 D2 Protecting Data - firewalls, passwords, etc

BTEC IT Level 3 D2 Protecting Data - firewalls, passwords, etc

7th - 12th Grade

20 Qs

MTA Networking Fundamentals: Lesson 1

MTA Networking Fundamentals: Lesson 1

11th Grade - University

16 Qs

Cybersecurity Vocabulary 2022

Cybersecurity Vocabulary 2022

9th - 12th Grade

18 Qs

ICT Cambridge Technicals L3 Unit 2 LO1 - 4

ICT Cambridge Technicals L3 Unit 2 LO1 - 4

12th Grade

18 Qs

Quiz-OSI Layers

Quiz-OSI Layers

12th Grade

15 Qs

BTEC Unit 1 - Transmitting Data - Networks

BTEC Unit 1 - Transmitting Data - Networks

12th Grade

15 Qs

034_Virtualization Vulnerabilities – Security+

034_Virtualization Vulnerabilities – Security+

9th Grade - University

20 Qs

Cyber II | M3 L9: Physical Security Controls by Mr. B

Cyber II | M3 L9: Physical Security Controls by Mr. B

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Cyber Professor - Mr. B

Used 11+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

ISO IEC 27001:2013 is suitable for which of the following
Use within organizations to formulate security requirements and objectives
Use within organizations to ensure that security risks are cost-effectively managed
Use within organizations to ensure compliance with laws and regulations
Provides federal protections for the personal health information held by covered entities and gives patients an array of rights with respect to that information
Definition of new information security management processes

2.

MULTIPLE SELECT QUESTION

3 mins • 3 pts

ISO IEC 27001:2013 is suitable for which of the following
Identification and clarification of existing information security management processes
Use by organization management to determine the status of information security management activities
provides independent oversight of public accounting firms providing audit services
Implementation of business-enabling information security
Use by organizations to provide relevant information about information security to customers

3.

MULTIPLE SELECT QUESTION

3 mins • 5 pts

FISMA standards include the
Standards for categorizing information and information systems by mission impact
Standards for minimum security requirements for information and information systems
Guidance for selecting appropriate security controls for information systems
Guidance for assessing security controls in information systems and determining security control effectiveness
Guidance for security authorization of information systems

4.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

Attempting to attract intruders to a system set up to monitor them is called what

Intrusion dettection

Intrusion deflection

Intrusion routing

Intrusion banishment

5.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

Which law was created to protect your health care data?
HIPAA
COPPA
ECPA
GLBA

6.

MULTIPLE CHOICE QUESTION

2 mins • 4 pts

Your company hired a pen tester as a contractor to conduct a security assessment of your network in order to meet rigorous PCI DSS standards.

What type of hacker best describes the pen tester?

Authorized

Non-authorized

Semi authorized

7.

MULTIPLE CHOICE QUESTION

2 mins • 5 pts

Many firewalls work with NAT which “hides” internal devices behind an external IP address. What does NAT stand for?

Network alternate translation

Network auto transit

Network administration translation

Network address translation

Network address transition

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?