IAS 2 Security Architecture and Design Quiz 3

IAS 2 Security Architecture and Design Quiz 3

University

35 Qs

quiz-placeholder

Similar activities

CPET 18L Pre-Midterm Exam

CPET 18L Pre-Midterm Exam

University

30 Qs

Digital Security

Digital Security

University

34 Qs

internet terms gpaul

internet terms gpaul

6th Grade - University

32 Qs

ISO27001

ISO27001

University

31 Qs

Cloud Computing - Bangkit Academy 2024 H1

Cloud Computing - Bangkit Academy 2024 H1

University

30 Qs

CybersecurityExam 7

CybersecurityExam 7

University

30 Qs

STC - Cyber Security and Forensics

STC - Cyber Security and Forensics

University

30 Qs

акт 8тест

акт 8тест

University

40 Qs

 IAS 2 Security Architecture and Design Quiz 3

IAS 2 Security Architecture and Design Quiz 3

Assessment

Quiz

Computers

University

Easy

Created by

Darwin Vargas

Used 2+ times

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the principle of "least privilege" imply?

A. Users should have access to all resources  

B. Users should have the minimum access necessary to perform their job functions

C. Security should be implemented through hidden mechanisms

D. Security should be based on the user's rank

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a security policy?

A. A set of guidelines for aesthetic design         

B. A document outlining the rules and procedures for protecting assets

C. A software tool for managing security

D. A list of all users and their permissions

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of security design, what does CIA stand for?

A. Confidentiality, Integrity, Availability                             

B. Central Intelligence Agency

C. Confidentiality, Information, Authentication              

D. Control, Integrity, Access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a demilitarized zone (DMZ) in network security?

A. To store backup data                                                        

   B. To host internal company resources

C. To provide an additional layer of security for external-facing services

D. To monitor employee activities

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a firewall?

A. A physical barrier to prevent unauthorized entry

B. A system designed to prevent unauthorized access to or from a private network

C. A software for managing user credentials

D. An encryption technique

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a "honeypot"?

A. A security mechanism that records all network traffic

B. A system designed to attract and trap potential attackers

C. A database of known security threats

D. A method for securing wireless networks

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "asymmetric cryptography" refer to?

A. Cryptography using the same key for encryption and decryption

 

B. Cryptography using different keys for encryption and decryption

C. Cryptography without any keys

D. Cryptography using hash functions

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?