IAS Finals Reviewer

IAS Finals Reviewer

University

24 Qs

quiz-placeholder

Similar activities

Cyber Security

Cyber Security

University

23 Qs

Ulangan harian Informatika

Ulangan harian Informatika

1st Grade - University

20 Qs

CPE2304 Quiz#5

CPE2304 Quiz#5

University

20 Qs

Device Hardening

Device Hardening

University

20 Qs

Day 12 - Networking & Security I - 1st Review - Day 11

Day 12 - Networking & Security I - 1st Review - Day 11

University

20 Qs

Cysec Club - Workshop Quiz

Cysec Club - Workshop Quiz

University

20 Qs

System and network support and management

System and network support and management

11th Grade - Professional Development

20 Qs

Fundamentals 18 Understanding DDoS Attacks

Fundamentals 18 Understanding DDoS Attacks

9th Grade - University

20 Qs

IAS Finals Reviewer

IAS Finals Reviewer

Assessment

Quiz

Computers

University

Easy

Created by

Kalo ‎

Used 15+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

method by which systems determine whether and how to admit a user into a trusted area of the organization—that is, information systems, restricted areas such as computer rooms, and the entire physical location.

Entry Control
Permission Management
User Authentication
Access Control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In information security, a combination of hardware and software that filters or prevents specific information from moving between the outside network and the inside network.

Firewall
Antivirus
Encryption
Router

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

private data network that uses the public telecommunications infrastructure to create a means for private communication via a tunneling protocol coupled with security procedures

Virtual Protected Network (VPN)
Virtual Public Network (VPN)
Virtual Private Network (VPN)
Virtual Personal Network (VPN)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In general, all access control approaches rely on the following four mechanisms, which represent the four fundamental functions of access control systems:

Identification, Authentication, Authorization,

Accountability

Authentication, Authorization, Auditing, Encryption

Identification, Validation, Permission, Monitoring

Authentication, Authorization, Auditing, Accountability

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are architectural implementations of firewalls?

Single Bastion Hosts, Screened Host Firewalls, Screened Subnet Firewalls

Network-based, Host-based, Application-based

Static, Dynamic, Hybrid

Inbound, Outbound, Bothway

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The general term for a system that can both detect and modify its configuration and environment to prevent intrusions. It encompasses the functions of both intrusion detection systems and intrusion prevention technology.

Intrusion Detection and Prevention Service (IDPS)
Intrusion Detection and Prevention Software (IDPS)
Intrusion Detection and Protection System (IDPS)
Intrusion Detection and Prevention System (IDPS)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An adverse event in which an attacker attempts to gain entry into an information system or disrupt its normal operations, almost always with the intent to do harm.

Data breach
Phishing attack
Malware infection

Intrusion

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?