
C1 - NetSec
Authored by Instructor Instructor
Instructional Technology
Professional Development
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
24 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of access to cloud storage devices?
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of using social networking?
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security service company is conducting an audit in several risk areas within a major corporation. What statement describes an attack vector?
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of access to removable media?
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security service company is conducting an audit in several risk areas within a major corporation. What statement describes an internal threat?
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which condition describes the potential threat created by Instant On in a data center?
Answer explanation
The phrase Instant On describes a potential threat to a VM when it is brought online after it has not been used for a period of time. Because it is offline for a while, it may have outdated security policies that deviate from the baseline security and can introduce security vulnerabilities.
The phrase Instant On describes a potential threat to a VM when it is brought online after it has not been used for a period of time. Because it is offline for a while, it may have outdated security policies that deviate from the baseline security and can introduce security vulnerabilities.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which security feature or device would more likely be used within a CAN than a SOHO or data center?
Answer explanation
A Cisco Email Security Appliance (ESA) and Web Security Appliance (WSA) provide advanced threat defense, application visibility and control, reporting, and secure mobility to secure and control email and web traffic at within a campus area network (CAN). A wireless router is a common defense mechanism used in a SOHO. Exit sensors and a security trap are features used within a data center. A virtual security gateway is integrated into Cisco Nexus switches and is used for inter-virtual machine security.
A Cisco Email Security Appliance (ESA) and Web Security Appliance (WSA) provide advanced threat defense, application visibility and control, reporting, and secure mobility to secure and control email and web traffic at within a campus area network (CAN). A wireless router is a common defense mechanism used in a SOHO. Exit sensors and a security trap are features used within a data center. A virtual security gateway is integrated into Cisco Nexus switches and is used for inter-virtual machine security.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?