CSF-PT05Q1

CSF-PT05Q1

Professional Development

15 Qs

quiz-placeholder

Similar activities

GDPR Multiple-Choice Questions

GDPR Multiple-Choice Questions

Professional Development

20 Qs

Network Security and Protocols Quiz

Network Security and Protocols Quiz

Professional Development

15 Qs

CyberSecurity Training-Quiz

CyberSecurity Training-Quiz

Professional Development

19 Qs

Lesson01 Quiz

Lesson01 Quiz

Professional Development

11 Qs

Cyber Ethics and Intellectual Property Quiz

Cyber Ethics and Intellectual Property Quiz

Professional Development

12 Qs

IoT Security & Trust_Quiz 1

IoT Security & Trust_Quiz 1

Professional Development

10 Qs

DEAM (Quiz 1)

DEAM (Quiz 1)

Professional Development

11 Qs

CSF-PT05Q1

CSF-PT05Q1

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Daisy Machoka

Used 8+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which security principle focuses on ensuring that data cannot be altered without authorization?

Confidentiality

Integrity

Availability

Authentication

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is an example of a physical security control?

Firewalls

Encryption

Turnstiles

Antivirus

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the main advantage of using Single Sign-On (SSO)?

It requires multiple passwords for increased security

It provides a higher level of encryption for data

It ensures that users have minimal access rights

It simplifies user authentication by allowing access to multiple applications with one set of credentials

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which device is primarily used to filter and monitor network traffic, both incoming and outgoing, according to predefined security rules?

Switch

Router

Firewall

Hub

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the primary function of a Virtual Private Network (VPN)?

To increase internet speed

To provide secure remote access to a network

To monitor network traffic

To detect malware

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a common method for preventing DDoS attacks?

Implementing strong passwords

Using intrusion detection systems (IDS)

Employing network firewalls

Deploying rate limiting and traffic analysis

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What type of attack involves intercepting and possibly modifying communication between two parties without their awareness?

Phishing

Man-in-the-Middle (MitM)

Denial of Service (DoS)

SQL Injection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?