Sec Review 2

Sec Review 2

University

10 Qs

quiz-placeholder

Similar activities

relaciones de bases de datos

relaciones de bases de datos

University

11 Qs

Visual Basic 2010

Visual Basic 2010

8th Grade - University

10 Qs

Software dan Hardware

Software dan Hardware

University

10 Qs

Website Usability and UX

Website Usability and UX

University

10 Qs

Python Week 1 & 2

Python Week 1 & 2

University

10 Qs

OM_SBENT3C_Q2

OM_SBENT3C_Q2

University - Professional Development

15 Qs

Quiz 1: The background and history of IoT

Quiz 1: The background and history of IoT

University

10 Qs

Diagramy czynności

Diagramy czynności

University

10 Qs

Sec Review 2

Sec Review 2

Assessment

Quiz

Computers

University

Medium

Created by

Tony Diaz

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

A network appliance that inspects traffic at both the transport and application layers, and can make decisions based on both is known as:

Web application firewall (WAF)

Next-generation firewall (NGFW)

Intrusion detection system (IDS)

Unified threat management (UTM)

2.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

When deploying IoT devices in an organization, what is a critical initial step to enhance security?

Hardening the device configurations.

Assigning them public IP addresses.

Using the same password for all devices for uniformity.

Regularly rebooting the devices.

3.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

When trying to streamline the access to a cloud application from the company’s internal application, which authentication mechanism would be best to use?

Security Assertions Markup Language (SAML)

Multifactor authentication

File integrity monitoring

Federation

4.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

The right for an individual to have their personal data erased by an entity that is storing it, especially online, is referred to as:

Data integrity

Right to be forgotten

Data retention

Data accountability

5.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which of the following best defines the maximum time an organization aims to recover its operations after a disaster?

Recovery point objective (RPO)

Recovery time objective (RTO)

Mean time between failures (MTBF)

Annualized loss expectancy (ALE)

6.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

During an incident response, what is the first stage to consider?

Eradication

Preparation

Analysis

Recovery

7.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

An organization wants to ensure that only HTTPS traffic is allowed while blocking HTTP. Which of the following would be the MOST effective in achieving this?

Adjust the group policy to deny web traffic.

Implement data loss prevention (DLP) on all network traffic.

Modify firewall rules to block port 80.

Modify firewall rules to block port 443.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?