Level 5 - Security Zones Quiz

Level 5 - Security Zones Quiz

15 Qs

quiz-placeholder

Similar activities

Resiliency and Site Security

Resiliency and Site Security

KG - University

19 Qs

Level 1 - Networking

Level 1 - Networking

KG - University

17 Qs

CH07 SECURITY AND ETHICAL CHALLENGES

CH07 SECURITY AND ETHICAL CHALLENGES

University

20 Qs

Level 3 - VPNs Quiz

Level 3 - VPNs Quiz

KG - University

10 Qs

1.3 Networks

1.3 Networks

KG - University

20 Qs

r9 L14 Quiz - Data Level Protection 1

r9 L14 Quiz - Data Level Protection 1

KG - University

10 Qs

Revision 3s

Revision 3s

KG - University

15 Qs

CSS written 1

CSS written 1

KG - University

10 Qs

Level 5 - Security Zones Quiz

Level 5 - Security Zones Quiz

Assessment

Quiz

others

Easy

Created by

Eric Jones

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 2 pts

What are the potential problems associated with big data storage? (check all that apply)
A. It's hard to analyze due to the large dataset size.
B. The dataset becomes so large it can no longer be managed.
C. The data is usually stored on insecure devices.
D. The information retrieved from big data isn't useful for businesses

2.

MULTIPLE SELECT QUESTION

30 sec • 2 pts

What are some ways that organizations can store large amounts of data? (Select all that apply)
A. Network Attached Storage (NAS)
B. Storage Area Network (SAN)
C. USB Flash Drives
D. Directly on individual computers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which file transfer protocol uses Secure Shell version 2 (SSH2) to secure data transfers?
A. FTP
B. TFTP
C. SCP
D. SFTP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

On a Windows system, which set of permissions can be set on drives, folders, and files?
A. Share
B. NTFS
C. Both Share and NTFS
D. Neither Share nor NTFS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a recommended hardware security measure?
A. Assign Co-owner share permissions to Everyone.
B. Door locks
C. Allow anonymous logins to the FTP server.
D. Share permissions can be set only on a folder.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a Faraday cage do in terms of security measures?
A. Blocks all electromagnetic emissions
B. Detects and neutralizes harmful malware
C. Acts as a physical barrier to access network cables
D. Encrypts all data transferred within its bounds

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an attack method that uses a USB charging station in public places?
A. Card cloning
B. Skimming
C. Malicious universal serial bus (USB) cable
D. Protected cable distribution

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?