CYBERSECURITY FUNDAMENTALS (CHAPTER 3)

CYBERSECURITY FUNDAMENTALS (CHAPTER 3)

9th - 12th Grade

32 Qs

quiz-placeholder

Similar activities

MLSA AZ-900 Study Group Final Quiz

MLSA AZ-900 Study Group Final Quiz

12th Grade

30 Qs

Y11 Network Threats Homework

Y11 Network Threats Homework

12th Grade

34 Qs

OCR J277 GCSE Paper 1 Recap

OCR J277 GCSE Paper 1 Recap

9th Grade - University

35 Qs

Network+ Prep Quiz

Network+ Prep Quiz

11th Grade

31 Qs

Networks (1)

Networks (1)

9th Grade

31 Qs

Network Security - Modules 5-7

Network Security - Modules 5-7

12th Grade

27 Qs

Topic 2.2 Network Architecture

Topic 2.2 Network Architecture

12th Grade

27 Qs

Network Architecture - Recap

Network Architecture - Recap

12th Grade - University

35 Qs

CYBERSECURITY FUNDAMENTALS (CHAPTER 3)

CYBERSECURITY FUNDAMENTALS (CHAPTER 3)

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

NURR (POLIMAS)

Used 8+ times

FREE Resource

32 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is an example of securing devices as part of infrastructure security?

Encrypting a USB drive

Implementing a firewall for the network

Installing antivirus software on endpoints

Applying a security baseline to the operating system

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media security primarily involves protecting physical storage devices like hard drives, USBs, and CDs from unauthorized access.

TRUE

FALSE

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does securing media involve in terms of infrastructure security?

Hardening applications

Encrypting storage devices

Monitoring network traffic

Creating a security policy

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A security topology refers to the physical layout of devices in a network without considering security elements.

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a security topology that provides an added layer of protection by placing certain systems outside the main network but accessible to external users?

Intrusion detection system (IDS)

Demilitarized zone (DMZ)

Antivirus software

Media encryption

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the purpose of intrusion detection systems in infrastructure security?

To block incoming traffic

To detect and report unauthorized access or breaches

To harden applications

To manage security policies

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An intrusion detection system (IDS) is a proactive system designed to prevent attacks from occurring.

TRUE

FALSE

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?