Cybersecurity quiz

Cybersecurity quiz

12th Grade

45 Qs

quiz-placeholder

Similar activities

LISTRIK-DINAMIS-KC

LISTRIK-DINAMIS-KC

9th - 12th Grade

50 Qs

Chapter 4 Evolution and Biodiversity

Chapter 4 Evolution and Biodiversity

12th Grade

43 Qs

Grade 9 - Respiratory System

Grade 9 - Respiratory System

9th - 12th Grade

42 Qs

PEWARISAN SIFAT DAN BIOTEKNOLOGI

PEWARISAN SIFAT DAN BIOTEKNOLOGI

9th - 12th Grade

40 Qs

Review for Quarterly exam

Review for Quarterly exam

12th Grade

40 Qs

ôn tập chương este - lipit - 2023-2024

ôn tập chương este - lipit - 2023-2024

12th Grade

40 Qs

PENILAIAN HARIAN SISTEM GERAK PADA MAKHLUK HIDUP

PENILAIAN HARIAN SISTEM GERAK PADA MAKHLUK HIDUP

12th Grade - University

40 Qs

Chapter 1 assessment

Chapter 1 assessment

7th - 12th Grade

40 Qs

Cybersecurity quiz

Cybersecurity quiz

Assessment

Quiz

Science

12th Grade

Practice Problem

Hard

NGSS
MS-ETS1-2, HS-ETS1-3, MS-ETS1-1

+1

Standards-aligned

Created by

hameeduddin syed

Used 3+ times

FREE Resource

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.496 A wet-known organization has been experiencing attacks from APTs. The organization is concerned that custom malware is being created and emailed into the company or installed on USB stocks that are dropped in parking lots. Which of the following is the best defense against this scenario?

A. Configuring signature-based antivirus to update every 30 minutes

B. Enforcing S/MIME for email and automatically encrypting USB drives upon assertion

C Implementing application execution in a sandbox for unknown software

D. Fuzzing new files for vulnerabilities if they are not digitally signed

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.497 A security administrator is seeking a solution to prevent unauthorized access to the internal network. Which of the following security solutions should the administrator choose?

A. MAC filtering

B. Anti-malware

C. Translation gateway

D VPN

Tags

NGSS.MS-ETS1-2

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

NO.498 A security architect is designing the new outbound internet for a small company. The company would like all 50 users to share the same single Internet connection. In addition, users will not be permitted to use social media sites or external email services while at work. Which of the following should be included in this design to satisfy these requirements? (Select TWO).

A. DLP

B. MAC filtering

C NAT

D VPN

E. Content filler

Tags

NGSS.MS-ETS1-1

NGSS.MS-ETS1-2

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.499 A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?

A. Testing input validation on the user input fields

B Performing code signing on company-developed software

C. Performing static code analysis on the software

D. Ensuring secure cookies are used

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.500 Which of the following is the MOST secure but LEAST expensive data destruction method for data that is stored on hard drives?

A. Pulverizing

B Shredding

C. Incinerating

D. Degaussing

Tags

NGSS.MS-ETS1-2

NGSS.MS-ETS1-3

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.501 A security analyst received the following requirements for the deployment of a security camera solution: The cameras must be viewable by the on-site security guards. + The cameras must be able to communicate with the video storage server. The cameras must have the time synchronized automatically. IT Certification Guaranteed, The Easy Way! 233 The cameras must not be reachable directly via the internet. The servers for the cameras and video storage must be available for remote maintenance via the company VPN. Which of the following should the security analyst recommend to securely meet the remote connectivity requirements?

A. Creating firewall rules that prevent outgoing traffic from the subnet the servers and cameras reside on

B Deploying a jump server that is accessible via the internal network that can communicate with the servers

C. Disabling all unused ports on the switch that the cameras are plugged into and enabling MAC filtering

D. Implementing a WAF to allow traffic from the local NTP server to the camera server

Tags

NGSS.MS-ETS1-1

NGSS.MS-ETS1-2

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.502 A government organization is developing an advanced Al defense system. Develop-ers are using information collected from third-party providers Analysts are no-ticing inconsistencies in the expected powers Of then learning and attribute the Outcome to a recent attack on one of the suppliers. Which of the following IS the most likely reason for the inaccuracy of the system?

A. Improper algorithms security

B Tainted training data

C. virus

D. Cryptomalware

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?