C1 - NetSec

C1 - NetSec

Professional Development

•

24 Qs

quiz-placeholder

Similar activities

Azure Fundamentals - Clase 2

Azure Fundamentals - Clase 2

Professional Development

•

20 Qs

TEMA SONIDO

TEMA SONIDO

Professional Development

•

20 Qs

ความฉลาดทางดิจิทัล 8 ด้าน

ความฉลาดทางดิจิทัล 8 ด้าน

Professional Development

•

20 Qs

BCS Network Security Test 7

BCS Network Security Test 7

University - Professional Development

•

20 Qs

Security Plus 1-02

Security Plus 1-02

Professional Development

•

20 Qs

Examen Final N° 2 - TĂ©cnicas de la ComunicaciĂ³n

Examen Final N° 2 - TĂ©cnicas de la ComunicaciĂ³n

Professional Development

•

20 Qs

Scratch

Scratch

Professional Development

•

20 Qs

Introduction to zoom quiz

Introduction to zoom quiz

Professional Development

•

21 Qs

C1 - NetSec

C1 - NetSec

Assessment

Quiz

•

Instructional Technology

•

Professional Development

•

Practice Problem

•

Medium

Created by

Instructor Instructor

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of access to cloud storage devices?

the retrieval of confidential or personal information from a lost or stolen device that was not configured to use encryption software
the unauthorized transfer of data containing valuable corporate information to a USB drive
sensitive data lost through access to the cloud that has been compromised due to weak security settings
intercepted emails that reveal confidential corporate or personal information

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of using social networking?

sensitive data lost through access to the cloud that has been compromised due to weak security settings
gaining illegal access to corporate data by stealing passwords or cracking weak passwords
data loss through access to personal or corporate instant messaging and social media sites
the retrieval of confidential or personal information from a lost or stolen device that was not configured to use encryption software

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes an attack vector?

the potential of causing great damage because of direct access to the building and its infrastructure devices
the unauthorized transfer of data containing valuable corporate information to a USB drive
the path by which a threat actor can gain access to a server, host, or network
the retrieval of confidential or personal information from a lost or stolen device that was not configured to use encryption software

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of access to removable media?

the potential of causing great damage because of direct access to the building and its infrastructure devices
intercepted emails that reveal confidential corporate or personal information
the unauthorized transfer of data containing valuable corporate information to a USB drive
data loss through access to personal or corporate instant messaging and social media sites

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes an internal threat?

the path by which a threat actor can gain access to a server, host, or network
intercepted emails that reveal confidential corporate or personal information
the potential of causing great damage because of direct access to the building and its infrastructure devices
gaining valuable information through the retrieval of discarded unshredded reports

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which condition describes the potential threat created by Instant On in a data center?

when the primary IPS appliance is malfunctioning
when the primary firewall in the data center crashes
when a VM that may have outdated security policies is brought online after a long period of inactivity
when an attacker hijacks a VM hypervisor and then launches attacks against other devices in the data center

Answer explanation

  • The phrase Instant On describes a potential threat to a VM when it is brought online after it has not been used for a period of time. Because it is offline for a while, it may have outdated security policies that deviate from the baseline security and can introduce security vulnerabilities.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which security feature or device would more likely be used within a CAN than a SOHO or data center?

ESA/WSA
wireless router
exit sensors
security trap
virtual security gateway

Answer explanation

  • A Cisco Email Security Appliance (ESA) and Web Security Appliance (WSA) provide advanced threat defense, application visibility and control, reporting, and secure mobility to secure and control email and web traffic at within a campus area network (CAN). A wireless router is a common defense mechanism used in a SOHO. Exit sensors and a security trap are features used within a data center. A virtual security gateway is integrated into Cisco Nexus switches and is used for inter-virtual machine security.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?