CYBERSECURITY FUNDAMENTALS (CHAPTER 3)

CYBERSECURITY FUNDAMENTALS (CHAPTER 3)

9th - 12th Grade

32 Qs

quiz-placeholder

Similar activities

98-367 PT3

98-367 PT3

9th - 12th Grade

35 Qs

IT Essentials ver 7.0 Chapter 13 Security

IT Essentials ver 7.0 Chapter 13 Security

11th Grade - University

28 Qs

Eduqas ICT - Mr Schofield

Eduqas ICT - Mr Schofield

9th - 12th Grade

35 Qs

Networking so far J277

Networking so far J277

9th - 11th Grade

28 Qs

007_Zero Trust - CompTIA Security+ SY0-701 - 1.2

007_Zero Trust - CompTIA Security+ SY0-701 - 1.2

12th Grade - University

27 Qs

005_AAA Cyber

005_AAA Cyber

12th Grade

27 Qs

006_Gap Analysis1.2

006_Gap Analysis1.2

12th Grade - University

27 Qs

BTEC Online World

BTEC Online World

10th Grade

29 Qs

CYBERSECURITY FUNDAMENTALS (CHAPTER 3)

CYBERSECURITY FUNDAMENTALS (CHAPTER 3)

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

NURR (POLIMAS)

Used 8+ times

FREE Resource

32 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is an example of securing devices as part of infrastructure security?

Encrypting a USB drive

Implementing a firewall for the network

Installing antivirus software on endpoints

Applying a security baseline to the operating system

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media security primarily involves protecting physical storage devices like hard drives, USBs, and CDs from unauthorized access.

TRUE

FALSE

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does securing media involve in terms of infrastructure security?

Hardening applications

Encrypting storage devices

Monitoring network traffic

Creating a security policy

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A security topology refers to the physical layout of devices in a network without considering security elements.

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a security topology that provides an added layer of protection by placing certain systems outside the main network but accessible to external users?

Intrusion detection system (IDS)

Demilitarized zone (DMZ)

Antivirus software

Media encryption

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the purpose of intrusion detection systems in infrastructure security?

To block incoming traffic

To detect and report unauthorized access or breaches

To harden applications

To manage security policies

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An intrusion detection system (IDS) is a proactive system designed to prevent attacks from occurring.

TRUE

FALSE

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?