IAS 2 Security Architecture and Design Quiz 3

Quiz
•
Computers
•
University
•
Easy
Darwin Vargas
Used 2+ times
FREE Resource
35 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the principle of "least privilege" imply?
A. Users should have access to all resources
B. Users should have the minimum access necessary to perform their job functions
C. Security should be implemented through hidden mechanisms
D. Security should be based on the user's rank
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a security policy?
A. A set of guidelines for aesthetic design
B. A document outlining the rules and procedures for protecting assets
C. A software tool for managing security
D. A list of all users and their permissions
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the context of security design, what does CIA stand for?
A. Confidentiality, Integrity, Availability
B. Central Intelligence Agency
C. Confidentiality, Information, Authentication
D. Control, Integrity, Access
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a demilitarized zone (DMZ) in network security?
A. To store backup data
B. To host internal company resources
C. To provide an additional layer of security for external-facing services
D. To monitor employee activities
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a firewall?
A. A physical barrier to prevent unauthorized entry
B. A system designed to prevent unauthorized access to or from a private network
C. A software for managing user credentials
D. An encryption technique
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes a "honeypot"?
A. A security mechanism that records all network traffic
B. A system designed to attract and trap potential attackers
C. A database of known security threats
D. A method for securing wireless networks
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term "asymmetric cryptography" refer to?
A. Cryptography using the same key for encryption and decryption
B. Cryptography using different keys for encryption and decryption
C. Cryptography without any keys
D. Cryptography using hash functions
Create a free account and access millions of resources
Similar Resources on Wayground
30 questions
Quiz on Quantum Computing

Quiz
•
University
40 questions
Blockchain Technology Quiz

Quiz
•
12th Grade - University
40 questions
Computer Networks Overview

Quiz
•
University
38 questions
NET1L - Lesson 1 (Internet Connections - Reliable Networks)

Quiz
•
University
34 questions
CompTIA Security+ SY0-601 Chapter 13 - 15

Quiz
•
University
32 questions
WAN & VPN/IPSec -- Modules 7 and 8

Quiz
•
11th Grade - University
30 questions
IT Quiz Bee 2023

Quiz
•
University
31 questions
ISO27001

Quiz
•
University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
21 questions
Spanish-Speaking Countries

Quiz
•
6th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
7 questions
Common and Proper Nouns

Interactive video
•
4th Grade - University
12 questions
Los numeros en español.

Lesson
•
6th Grade - University
7 questions
PC: Unit 1 Quiz Review

Quiz
•
11th Grade - University
7 questions
Supporting the Main Idea –Informational

Interactive video
•
4th Grade - University
12 questions
Hurricane or Tornado

Quiz
•
3rd Grade - University
7 questions
Enzymes (Updated)

Interactive video
•
11th Grade - University