IAs1-Quiz No.2 (final term)

IAs1-Quiz No.2 (final term)

University

10 Qs

quiz-placeholder

Similar activities

Operating System - Chapter 1-1

Operating System - Chapter 1-1

University

10 Qs

Week 3- lecture (DATA MODELS)

Week 3- lecture (DATA MODELS)

University

13 Qs

Copa Grupo A - Univalle

Copa Grupo A - Univalle

University

10 Qs

Microcontroller

Microcontroller

University

15 Qs

Pre UPS 2

Pre UPS 2

University

12 Qs

Introduction to Database & Database Environment

Introduction to Database & Database Environment

University

15 Qs

Q8 - Ent. Sys

Q8 - Ent. Sys

University

10 Qs

QUIZ ON AI

QUIZ ON AI

University

10 Qs

IAs1-Quiz No.2 (final term)

IAs1-Quiz No.2 (final term)

Assessment

Quiz

Computers

University

Easy

Created by

PERCIVAL ADAO

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In security architecture, what is the number two approach of most security personnel carrying out the security process?

Develop acrchitecture

Steblsih objectives

Determine approach

Review and revise

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a good security architecture, which of the given choices does not belong to the three components?

Standars and frameworks

Network and security

People, policies and procedures

Data privacy

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the most often overlooked to consider as a vital component of a cybersecurity architecture?

People

Network security

Standard policies

Security weaknesses

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is not only legally required but also a great way to improve your organization’s overall cyber hygiene?

People

Network security

Standard and framework

Security weaknesses

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Network topologies among nodes such as point-to-point, circular, chain, and hybrid are one of the elements of...

People

Network and security

Standards and frameworks

Security weaknesses

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

It guides IT professionals in dealing with security breaches and disaster recovery with a detailed plan that allows business processes to resume or continue despite a security incident.

Security Protocols

Network and security

Standards and frameworks

Security weaknesses

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security architecture must protect the whole IT infrastructure. As such, it should detail who can access sensitive data and who cannot.

Security Protocols

Security roles and their responsibilities

Standards and frameworks

Account creation and management

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?