Cybersecurity Chapter 6

Cybersecurity Chapter 6

11th Grade

12 Qs

quiz-placeholder

Similar activities

Computing figures

Computing figures

4th - 12th Grade

14 Qs

BTEC Level 3 Nat Ext Dip in Computing - Unit 2.1 Hardware and Software

BTEC Level 3 Nat Ext Dip in Computing - Unit 2.1 Hardware and Software

11th - 12th Grade

10 Qs

EmTech Q2 Post Test 2

EmTech Q2 Post Test 2

11th Grade

15 Qs

CSS background, border

CSS background, border

11th Grade

10 Qs

Computer Performance

Computer Performance

9th - 11th Grade

10 Qs

Kuis tipedata, flowchart informatima kelas X j4njang SMA

Kuis tipedata, flowchart informatima kelas X j4njang SMA

9th - 12th Grade

10 Qs

Grade 11 Term 4 Practice 2

Grade 11 Term 4 Practice 2

11th Grade

10 Qs

Los periféricos del computador

Los periféricos del computador

1st Grade - Professional Development

9 Qs

Cybersecurity Chapter 6

Cybersecurity Chapter 6

Assessment

Quiz

Computers

11th Grade

Practice Problem

Hard

Created by

E Sheng Toh

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not or eradicated by antivirus.

What technology can be put in place to detect potential malware traffic on the network?

NAC

firewall

IDS

IPS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The CEO of a company is concerned that if a data breach should occur and customer data is exposed, the company could be sued. So the CEO made the decision to buy insurance for the company.

What type of risk mitigation is the CEO implementing?

reduction

mitigation

avoidance

transference

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is running a routine audit of the server hardware in the company data center. Several servers are using single drives to host operate and multiple types of attached storage solutions for storing data.

The user wants to offer a better solution to provide fault tolerance during failure.

Which solution is best?

Spanning Tree

RAID

UPS

Hot Standby Router Protocol

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A team has been asked to create an incident response plan for security incidents.

In what phase of an incident response plan does the management approval of the plan?

analysis

preparation

containment

post-incident

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A user needs to add redundancy to the routers in a company. What are the three options the user can use? (Choose three.)

STP

HSRP

VRRP

GLBP

RAID

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security breach has happened at a major corporation. The incident team has responded and executed their incident response plan and looking at how to monitor and improve the process.

What part of the incident response plan is this?

preparation

post-incident

containment

detection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is redesigning a network for a small company and wants to ensure security at a reasonable price. The user deploys a new application firewall with intrusion detection capabilities on the ISP connection.

The user installs a second firewall to separate the company network for public network.

Additionally, the user installs an IPS on the internal network of the company.

What approach is the user implementing?

layered

risk based

attack based

structured

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?