C1 - NetSec

C1 - NetSec

Professional Development

24 Qs

quiz-placeholder

Similar activities

Konde technology quiz - Do you know your educational Apps?

Konde technology quiz - Do you know your educational Apps?

Professional Development

21 Qs

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

Google Educator Level 1_Sheets Quiz

Google Educator Level 1_Sheets Quiz

Professional Development

19 Qs

Fundamentos Azure - Clase 1

Fundamentos Azure - Clase 1

Professional Development

20 Qs

COMPONENTES INTERNOS Y EXTERNOS DE UNA COMPUTADORA

COMPONENTES INTERNOS Y EXTERNOS DE UNA COMPUTADORA

Professional Development

20 Qs

Eletrônica Digital

Eletrônica Digital

Professional Development

20 Qs

GAME: aula 8

GAME: aula 8

Professional Development

20 Qs

BCS Systems & Architecture Quiz 1

BCS Systems & Architecture Quiz 1

University - Professional Development

20 Qs

C1 - NetSec

C1 - NetSec

Assessment

Quiz

Instructional Technology

Professional Development

Medium

Created by

Instructor Instructor

Used 2+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of access to cloud storage devices?

the retrieval of confidential or personal information from a lost or stolen device that was not configured to use encryption software
the unauthorized transfer of data containing valuable corporate information to a USB drive
sensitive data lost through access to the cloud that has been compromised due to weak security settings
intercepted emails that reveal confidential corporate or personal information

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of using social networking?

sensitive data lost through access to the cloud that has been compromised due to weak security settings
gaining illegal access to corporate data by stealing passwords or cracking weak passwords
data loss through access to personal or corporate instant messaging and social media sites
the retrieval of confidential or personal information from a lost or stolen device that was not configured to use encryption software

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes an attack vector?

the potential of causing great damage because of direct access to the building and its infrastructure devices
the unauthorized transfer of data containing valuable corporate information to a USB drive
the path by which a threat actor can gain access to a server, host, or network
the retrieval of confidential or personal information from a lost or stolen device that was not configured to use encryption software

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of access to removable media?

the potential of causing great damage because of direct access to the building and its infrastructure devices
intercepted emails that reveal confidential corporate or personal information
the unauthorized transfer of data containing valuable corporate information to a USB drive
data loss through access to personal or corporate instant messaging and social media sites

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes an internal threat?

the path by which a threat actor can gain access to a server, host, or network
intercepted emails that reveal confidential corporate or personal information
the potential of causing great damage because of direct access to the building and its infrastructure devices
gaining valuable information through the retrieval of discarded unshredded reports

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which condition describes the potential threat created by Instant On in a data center?

when the primary IPS appliance is malfunctioning
when the primary firewall in the data center crashes
when a VM that may have outdated security policies is brought online after a long period of inactivity
when an attacker hijacks a VM hypervisor and then launches attacks against other devices in the data center

Answer explanation

  • The phrase Instant On describes a potential threat to a VM when it is brought online after it has not been used for a period of time. Because it is offline for a while, it may have outdated security policies that deviate from the baseline security and can introduce security vulnerabilities.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which security feature or device would more likely be used within a CAN than a SOHO or data center?

ESA/WSA
wireless router
exit sensors
security trap
virtual security gateway

Answer explanation

  • A Cisco Email Security Appliance (ESA) and Web Security Appliance (WSA) provide advanced threat defense, application visibility and control, reporting, and secure mobility to secure and control email and web traffic at within a campus area network (CAN). A wireless router is a common defense mechanism used in a SOHO. Exit sensors and a security trap are features used within a data center. A virtual security gateway is integrated into Cisco Nexus switches and is used for inter-virtual machine security.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?