Search Header Logo

IAS 2 Security Architecture and Design Quiz 3

Authored by Darwin Vargas

Computers

University

Used 3+ times

 IAS 2 Security Architecture and Design Quiz 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the principle of "least privilege" imply?

A. Users should have access to all resources  

B. Users should have the minimum access necessary to perform their job functions

C. Security should be implemented through hidden mechanisms

D. Security should be based on the user's rank

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a security policy?

A. A set of guidelines for aesthetic design         

B. A document outlining the rules and procedures for protecting assets

C. A software tool for managing security

D. A list of all users and their permissions

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of security design, what does CIA stand for?

A. Confidentiality, Integrity, Availability                             

B. Central Intelligence Agency

C. Confidentiality, Information, Authentication              

D. Control, Integrity, Access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a demilitarized zone (DMZ) in network security?

A. To store backup data                                                        

   B. To host internal company resources

C. To provide an additional layer of security for external-facing services

D. To monitor employee activities

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a firewall?

A. A physical barrier to prevent unauthorized entry

B. A system designed to prevent unauthorized access to or from a private network

C. A software for managing user credentials

D. An encryption technique

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a "honeypot"?

A. A security mechanism that records all network traffic

B. A system designed to attract and trap potential attackers

C. A database of known security threats

D. A method for securing wireless networks

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "asymmetric cryptography" refer to?

A. Cryptography using the same key for encryption and decryption

 

B. Cryptography using different keys for encryption and decryption

C. Cryptography without any keys

D. Cryptography using hash functions

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?