
Cybersecurity quiz
Authored by hameeduddin syed
Science
12th Grade
NGSS covered
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
45 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.496 A wet-known organization has been experiencing attacks from APTs. The organization is concerned that custom malware is being created and emailed into the company or installed on USB stocks that are dropped in parking lots. Which of the following is the best defense against this scenario?
A. Configuring signature-based antivirus to update every 30 minutes
B. Enforcing S/MIME for email and automatically encrypting USB drives upon assertion
C Implementing application execution in a sandbox for unknown software
D. Fuzzing new files for vulnerabilities if they are not digitally signed
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.497 A security administrator is seeking a solution to prevent unauthorized access to the internal network. Which of the following security solutions should the administrator choose?
A. MAC filtering
B. Anti-malware
C. Translation gateway
D VPN
Tags
NGSS.MS-ETS1-2
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
NO.498 A security architect is designing the new outbound internet for a small company. The company would like all 50 users to share the same single Internet connection. In addition, users will not be permitted to use social media sites or external email services while at work. Which of the following should be included in this design to satisfy these requirements? (Select TWO).
A. DLP
B. MAC filtering
C NAT
D VPN
E. Content filler
Tags
NGSS.MS-ETS1-2
NGSS.MS-ETS1-1
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.499 A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?
A. Testing input validation on the user input fields
B Performing code signing on company-developed software
C. Performing static code analysis on the software
D. Ensuring secure cookies are used
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.500 Which of the following is the MOST secure but LEAST expensive data destruction method for data that is stored on hard drives?
A. Pulverizing
B Shredding
C. Incinerating
D. Degaussing
Tags
NGSS.MS-ETS1-2
NGSS.MS-ETS1-3
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.501 A security analyst received the following requirements for the deployment of a security camera solution: The cameras must be viewable by the on-site security guards. + The cameras must be able to communicate with the video storage server. The cameras must have the time synchronized automatically. IT Certification Guaranteed, The Easy Way! 233 The cameras must not be reachable directly via the internet. The servers for the cameras and video storage must be available for remote maintenance via the company VPN. Which of the following should the security analyst recommend to securely meet the remote connectivity requirements?
A. Creating firewall rules that prevent outgoing traffic from the subnet the servers and cameras reside on
B Deploying a jump server that is accessible via the internal network that can communicate with the servers
C. Disabling all unused ports on the switch that the cameras are plugged into and enabling MAC filtering
D. Implementing a WAF to allow traffic from the local NTP server to the camera server
Tags
NGSS.MS-ETS1-2
NGSS.MS-ETS1-1
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.502 A government organization is developing an advanced Al defense system. Develop-ers are using information collected from third-party providers Analysts are no-ticing inconsistencies in the expected powers Of then learning and attribute the Outcome to a recent attack on one of the suppliers. Which of the following IS the most likely reason for the inaccuracy of the system?
A. Improper algorithms security
B Tainted training data
C. virus
D. Cryptomalware
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
40 questions
TO FISIKA XII IPA
Quiz
•
12th Grade
50 questions
QUIZZ (PENGETAHUAN UMUM) LINK 9
Quiz
•
12th Grade
40 questions
Heat and Temp: Topic 1 + 2 Review
Quiz
•
7th Grade - University
42 questions
Veins
Quiz
•
9th - 12th Grade
48 questions
PLTW Principles of Biomedical Science - Midterm Review
Quiz
•
9th - 12th Grade
50 questions
SPM Sains 2
Quiz
•
11th - 12th Grade
45 questions
US PROJEK IPAS
Quiz
•
12th Grade - University
46 questions
Bonding Review PS
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Science
14 questions
Natural Selection and Adaptation
Lesson
•
9th - 12th Grade
30 questions
Unit 2C Progress Check (Biosphere 3)
Quiz
•
9th - 12th Grade
15 questions
Punnett Square & Pedigree Charts- Review
Quiz
•
9th - 12th Grade
28 questions
Asexual vs. Sexual Reproduction
Quiz
•
9th - 12th Grade
25 questions
Heredity and Punnett Squares
Quiz
•
9th - 12th Grade
17 questions
Explore Plate Boundaries and Tectonic Processes
Quiz
•
9th - 12th Grade
12 questions
Identify Functions of Cell Organelles
Quiz
•
9th - 12th Grade
19 questions
Electricity and Magnetism
Lesson
•
9th - 12th Grade