Search Header Logo

Cybersecurity quiz

Authored by hameeduddin syed

Science

12th Grade

NGSS covered

Used 3+ times

Cybersecurity quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.496 A wet-known organization has been experiencing attacks from APTs. The organization is concerned that custom malware is being created and emailed into the company or installed on USB stocks that are dropped in parking lots. Which of the following is the best defense against this scenario?

A. Configuring signature-based antivirus to update every 30 minutes

B. Enforcing S/MIME for email and automatically encrypting USB drives upon assertion

C Implementing application execution in a sandbox for unknown software

D. Fuzzing new files for vulnerabilities if they are not digitally signed

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.497 A security administrator is seeking a solution to prevent unauthorized access to the internal network. Which of the following security solutions should the administrator choose?

A. MAC filtering

B. Anti-malware

C. Translation gateway

D VPN

Tags

NGSS.MS-ETS1-2

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

NO.498 A security architect is designing the new outbound internet for a small company. The company would like all 50 users to share the same single Internet connection. In addition, users will not be permitted to use social media sites or external email services while at work. Which of the following should be included in this design to satisfy these requirements? (Select TWO).

A. DLP

B. MAC filtering

C NAT

D VPN

E. Content filler

Tags

NGSS.MS-ETS1-2

NGSS.MS-ETS1-1

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.499 A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?

A. Testing input validation on the user input fields

B Performing code signing on company-developed software

C. Performing static code analysis on the software

D. Ensuring secure cookies are used

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.500 Which of the following is the MOST secure but LEAST expensive data destruction method for data that is stored on hard drives?

A. Pulverizing

B Shredding

C. Incinerating

D. Degaussing

Tags

NGSS.MS-ETS1-2

NGSS.MS-ETS1-3

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.501 A security analyst received the following requirements for the deployment of a security camera solution: The cameras must be viewable by the on-site security guards. + The cameras must be able to communicate with the video storage server. The cameras must have the time synchronized automatically. IT Certification Guaranteed, The Easy Way! 233 The cameras must not be reachable directly via the internet. The servers for the cameras and video storage must be available for remote maintenance via the company VPN. Which of the following should the security analyst recommend to securely meet the remote connectivity requirements?

A. Creating firewall rules that prevent outgoing traffic from the subnet the servers and cameras reside on

B Deploying a jump server that is accessible via the internal network that can communicate with the servers

C. Disabling all unused ports on the switch that the cameras are plugged into and enabling MAC filtering

D. Implementing a WAF to allow traffic from the local NTP server to the camera server

Tags

NGSS.MS-ETS1-2

NGSS.MS-ETS1-1

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.502 A government organization is developing an advanced Al defense system. Develop-ers are using information collected from third-party providers Analysts are no-ticing inconsistencies in the expected powers Of then learning and attribute the Outcome to a recent attack on one of the suppliers. Which of the following IS the most likely reason for the inaccuracy of the system?

A. Improper algorithms security

B Tainted training data

C. virus

D. Cryptomalware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?