CYBERSECURITY FUNDAMENTALS (CHAPTER 3)

CYBERSECURITY FUNDAMENTALS (CHAPTER 3)

9th - 12th Grade

•

32 Qs

quiz-placeholder

Similar activities

CLASS 12TH COMPUTER APPLICATIONS SB- II-MID TERM

CLASS 12TH COMPUTER APPLICATIONS SB- II-MID TERM

12th Grade

•

28 Qs

Impacts of Technology - Summative Assessment

Impacts of Technology - Summative Assessment

10th Grade

•

31 Qs

Bridge Course - Screening Test

Bridge Course - Screening Test

10th Grade - Professional Development

•

30 Qs

Computer Essentials 1

Computer Essentials 1

10th Grade

•

34 Qs

CSS g9 2Q 1st Summative

CSS g9 2Q 1st Summative

9th Grade

•

28 Qs

Module 24 - Portable Computing 2

Module 24 - Portable Computing 2

9th - 12th Grade

•

28 Qs

Vamos con PowerPoint 4°

Vamos con PowerPoint 4°

9th Grade

•

28 Qs

Creative iMedia R081 - Client requirements and Research

Creative iMedia R081 - Client requirements and Research

9th - 11th Grade

•

30 Qs

CYBERSECURITY FUNDAMENTALS (CHAPTER 3)

CYBERSECURITY FUNDAMENTALS (CHAPTER 3)

Assessment

Quiz

•

Computers

•

9th - 12th Grade

•

Practice Problem

•

Medium

Created by

NURR (POLIMAS)

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

32 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is an example of securing devices as part of infrastructure security?

Encrypting a USB drive

Implementing a firewall for the network

Installing antivirus software on endpoints

Applying a security baseline to the operating system

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media security primarily involves protecting physical storage devices like hard drives, USBs, and CDs from unauthorized access.

TRUE

FALSE

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does securing media involve in terms of infrastructure security?

Hardening applications

Encrypting storage devices

Monitoring network traffic

Creating a security policy

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A security topology refers to the physical layout of devices in a network without considering security elements.

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a security topology that provides an added layer of protection by placing certain systems outside the main network but accessible to external users?

Intrusion detection system (IDS)

Demilitarized zone (DMZ)

Antivirus software

Media encryption

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the purpose of intrusion detection systems in infrastructure security?

To block incoming traffic

To detect and report unauthorized access or breaches

To harden applications

To manage security policies

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An intrusion detection system (IDS) is a proactive system designed to prevent attacks from occurring.

TRUE

FALSE

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?