Cybersecurity Chapter 6
Quiz
•
Computers
•
11th Grade
•
Practice Problem
•
Hard
E Sheng Toh
Used 3+ times
FREE Resource
Enhance your content in a minute
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not or eradicated by antivirus.
What technology can be put in place to detect potential malware traffic on the network?
NAC
firewall
IDS
IPS
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The CEO of a company is concerned that if a data breach should occur and customer data is exposed, the company could be sued. So the CEO made the decision to buy insurance for the company.
What type of risk mitigation is the CEO implementing?
reduction
mitigation
avoidance
transference
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user is running a routine audit of the server hardware in the company data center. Several servers are using single drives to host operate and multiple types of attached storage solutions for storing data.
The user wants to offer a better solution to provide fault tolerance during failure.
Which solution is best?
Spanning Tree
RAID
UPS
Hot Standby Router Protocol
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A team has been asked to create an incident response plan for security incidents.
In what phase of an incident response plan does the management approval of the plan?
analysis
preparation
containment
post-incident
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A user needs to add redundancy to the routers in a company. What are the three options the user can use? (Choose three.)
STP
HSRP
VRRP
GLBP
RAID
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security breach has happened at a major corporation. The incident team has responded and executed their incident response plan and looking at how to monitor and improve the process.
What part of the incident response plan is this?
preparation
post-incident
containment
detection
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user is redesigning a network for a small company and wants to ensure security at a reasonable price. The user deploys a new application firewall with intrusion detection capabilities on the ISP connection.
The user installs a second firewall to separate the company network for public network.
Additionally, the user installs an IPS on the internal network of the company.
What approach is the user implementing?
layered
risk based
attack based
structured
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
17 questions
FormazioneSicurezzaSpecifica_Mod. 3.1
Quiz
•
9th - 12th Grade
10 questions
Visual Basic 2010
Quiz
•
8th Grade - University
10 questions
Adobe Flash Profesional
Quiz
•
11th Grade
16 questions
ETİK BİLGİ VE SİBER SUÇLAR
Quiz
•
1st - 12th Grade
10 questions
ICT as Platform for Change
Quiz
•
11th - 12th Grade
13 questions
Sistemas de información
Quiz
•
10th Grade - University
12 questions
Clase de Computación: Excel
Quiz
•
11th Grade
13 questions
Pengenalan Aplikasi Blender
Quiz
•
11th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
