
Cyber II | M3 L9: Physical Security Controls by Mr. B
Authored by Cyber Professor - Mr. B
Computers
12th Grade
Used 12+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
2 mins • 3 pts
ISO IEC 27001:2013 is suitable for which of the following
2.
MULTIPLE SELECT QUESTION
3 mins • 3 pts
ISO IEC 27001:2013 is suitable for which of the following
3.
MULTIPLE SELECT QUESTION
3 mins • 5 pts
FISMA standards include the
4.
MULTIPLE CHOICE QUESTION
1 min • 3 pts
Attempting to attract intruders to a system set up to monitor them is called what
Intrusion dettection
Intrusion deflection
Intrusion routing
Intrusion banishment
5.
MULTIPLE CHOICE QUESTION
1 min • 3 pts
Which law was created to protect your health care data?
6.
MULTIPLE CHOICE QUESTION
2 mins • 4 pts
Your company hired a pen tester as a contractor to conduct a security assessment of your network in order to meet rigorous PCI DSS standards.
What type of hacker best describes the pen tester?
Authorized
Non-authorized
Semi authorized
7.
MULTIPLE CHOICE QUESTION
2 mins • 5 pts
Many firewalls work with NAT which “hides” internal devices behind an external IP address. What does NAT stand for?
Network alternate translation
Network auto transit
Network administration translation
Network address translation
Network address transition
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?