Search Header Logo

Basic Securities Quiz

Authored by nur idaw undefined

Computers

12th Grade

Used 1+ times

Basic Securities Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the four types of threats that may arise after a threat actor gains access to a network?

Data Breach, System Failure, Unauthorized Access, Network Disruption

Phishing, Ransomware, DDoS, Malware

Information Theft, Data Loss and Manipulation, Identity Theft, Disruption of Service

Firewall Breach, Endpoint Security, Password Leak, Physical Damage

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three primary vulnerabilities or weaknesses in a network or device?

Data Vulnerabilities, Identity Vulnerabilities, Service Vulnerabilities

Technological Vulnerabilities, Configuration Vulnerabilities, Security Policy Vulnerabilities

Hardware Vulnerabilities, Software Vulnerabilities, Network Vulnerabilities

Physical Vulnerabilities, Environmental Vulnerabilities, Electrical Vulnerabilities

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the four classes of physical threats that can compromise network resources?

Software threats, Network threats, Data threats, Identity threats

Phishing threats, Malware threats, DDoS threats, Ransomware threats

Hardware threats, Environmental threats, Electrical threats, Maintenance threats

Firewall threats, Endpoint threats, Password threats, Physical threats

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware and what are the types?

Malware is a type of vulnerability, Types include Technological, Configuration, and Security Policy

Malware is a type of network attack, Types include Reconnaissance, Access, and Denial of Service

Malware is a type of hardware, Types include Phishing, Ransomware, and DDoS

Malware is malicious software, Types include Viruses, Worms, and Trojan Horses

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three major categories of network attacks?

Firewall, Endpoint Security, Password Leak

Reconnaissance, Access, Denial of Service

Phishing, Malware, DDoS

Physical Damage, Environmental Threats, Electrical Vulnerabilities

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the defense-in-depth approach to security and what devices are mentioned for protection?

A layered approach to security, Devices include VPN, ASA Firewall, IPS, ESA/WSA, AAA Server

A single-layered approach to security, Devices include Antivirus, Firewall, Encryption, Intrusion Detection

A reactive approach to security, Devices include Backup, Update, Patch, Authentication

A preventive approach to security, Devices include Physical Security, Network Attacks, Endpoint Security, Device Security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to keep backups of device configurations and data?

To save storage space, To prevent unauthorized access, To protect against data loss, To improve network speed

To enhance device performance, To comply with regulations, To simplify troubleshooting, To reduce network traffic

To limit access control, To encourage data breaches, To ignore security policies, To overlook system vulnerabilities

To increase security risks, To complicate network management, To slow down network operations, To confuse network administrators

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?