Level 5 - Security Zones Quiz

Level 5 - Security Zones Quiz

15 Qs

quiz-placeholder

Similar activities

ITN7 - Module 16 Quiz

ITN7 - Module 16 Quiz

KG - University

15 Qs

L4. Protocols & Layers (Starter)

L4. Protocols & Layers (Starter)

KG - University

16 Qs

NetFun kapittel 1-4 oppsumering

NetFun kapittel 1-4 oppsumering

KG - University

14 Qs

EmnelisteQuizz

EmnelisteQuizz

KG - University

17 Qs

United Nations Quiz

United Nations Quiz

9th Grade

10 Qs

Test Module 1-5

Test Module 1-5

KG - University

18 Qs

Level 5 - Security Zones Quiz

Level 5 - Security Zones Quiz

Assessment

Quiz

others

Hard

Created by

Eric Jones

FREE Resource

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 2 pts

What are the potential problems associated with big data storage? (check all that apply)
A. It's hard to analyze due to the large dataset size.
B. The dataset becomes so large it can no longer be managed.
C. The data is usually stored on insecure devices.
D. The information retrieved from big data isn't useful for businesses

2.

MULTIPLE SELECT QUESTION

30 sec • 2 pts

What are some ways that organizations can store large amounts of data? (Select all that apply)
A. Network Attached Storage (NAS)
B. Storage Area Network (SAN)
C. USB Flash Drives
D. Directly on individual computers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which file transfer protocol uses Secure Shell version 2 (SSH2) to secure data transfers?
A. FTP
B. TFTP
C. SCP
D. SFTP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

On a Windows system, which set of permissions can be set on drives, folders, and files?
A. Share
B. NTFS
C. Both Share and NTFS
D. Neither Share nor NTFS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a recommended hardware security measure?
A. Assign Co-owner share permissions to Everyone.
B. Door locks
C. Allow anonymous logins to the FTP server.
D. Share permissions can be set only on a folder.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a Faraday cage do in terms of security measures?
A. Blocks all electromagnetic emissions
B. Detects and neutralizes harmful malware
C. Acts as a physical barrier to access network cables
D. Encrypts all data transferred within its bounds

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an attack method that uses a USB charging station in public places?
A. Card cloning
B. Skimming
C. Malicious universal serial bus (USB) cable
D. Protected cable distribution

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?