C1 - NetSec

C1 - NetSec

Professional Development

24 Qs

quiz-placeholder

Similar activities

ISMS Assessment

ISMS Assessment

Professional Development

20 Qs

Cyber Policy Quiz 1

Cyber Policy Quiz 1

Professional Development

23 Qs

MD 100 Review

MD 100 Review

Professional Development

20 Qs

INTRODUCCIÓN A REDES DE COMPUTADORAS

INTRODUCCIÓN A REDES DE COMPUTADORAS

Professional Development

20 Qs

Basic Cybersecurity Concepts 1

Basic Cybersecurity Concepts 1

Professional Development

25 Qs

CySa+ PT5: 3 of 3

CySa+ PT5: 3 of 3

9th Grade - Professional Development

20 Qs

Connecting to the Internet

Connecting to the Internet

Professional Development

21 Qs

CCNA STUDY

CCNA STUDY

Professional Development

19 Qs

C1 - NetSec

C1 - NetSec

Assessment

Quiz

Instructional Technology

Professional Development

Medium

Created by

Instructor Instructor

Used 2+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of access to cloud storage devices?
the retrieval of confidential or personal information from a lost or stolen device that was not configured to use encryption software
the unauthorized transfer of data containing valuable corporate information to a USB drive
sensitive data lost through access to the cloud that has been compromised due to weak security settings
intercepted emails that reveal confidential corporate or personal information

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of using social networking?
sensitive data lost through access to the cloud that has been compromised due to weak security settings
gaining illegal access to corporate data by stealing passwords or cracking weak passwords
data loss through access to personal or corporate instant messaging and social media sites
the retrieval of confidential or personal information from a lost or stolen device that was not configured to use encryption software

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes an attack vector?
the potential of causing great damage because of direct access to the building and its infrastructure devices
the unauthorized transfer of data containing valuable corporate information to a USB drive
the path by which a threat actor can gain access to a server, host, or network
the retrieval of confidential or personal information from a lost or stolen device that was not configured to use encryption software

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of access to removable media?
the potential of causing great damage because of direct access to the building and its infrastructure devices
intercepted emails that reveal confidential corporate or personal information
the unauthorized transfer of data containing valuable corporate information to a USB drive
data loss through access to personal or corporate instant messaging and social media sites

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes an internal threat?
the path by which a threat actor can gain access to a server, host, or network
intercepted emails that reveal confidential corporate or personal information
the potential of causing great damage because of direct access to the building and its infrastructure devices
gaining valuable information through the retrieval of discarded unshredded reports

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which condition describes the potential threat created by Instant On in a data center?
when the primary IPS appliance is malfunctioning
when the primary firewall in the data center crashes
when a VM that may have outdated security policies is brought online after a long period of inactivity
when an attacker hijacks a VM hypervisor and then launches attacks against other devices in the data center

Answer explanation

  • The phrase Instant On describes a potential threat to a VM when it is brought online after it has not been used for a period of time. Because it is offline for a while, it may have outdated security policies that deviate from the baseline security and can introduce security vulnerabilities.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which security feature or device would more likely be used within a CAN than a SOHO or data center?
ESA/WSA
wireless router
exit sensors
security trap
virtual security gateway

Answer explanation

  • A Cisco Email Security Appliance (ESA) and Web Security Appliance (WSA) provide advanced threat defense, application visibility and control, reporting, and secure mobility to secure and control email and web traffic at within a campus area network (CAN). A wireless router is a common defense mechanism used in a SOHO. Exit sensors and a security trap are features used within a data center. A virtual security gateway is integrated into Cisco Nexus switches and is used for inter-virtual machine security.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?