Security Controls Quiz

Security Controls Quiz

10th Grade

18 Qs

quiz-placeholder

Similar activities

The Role of IETF & Network Protocols

The Role of IETF & Network Protocols

10th Grade - University

15 Qs

CK Cyber 1 - 1.3 Enterprise Security

CK Cyber 1 - 1.3 Enterprise Security

10th Grade

15 Qs

G4-Microprocessors and Their Uses

G4-Microprocessors and Their Uses

4th Grade - University

15 Qs

Cyber 1 Networking FINAL

Cyber 1 Networking FINAL

9th - 12th Grade

20 Qs

CPT C10 Networking (Network Hardware and Addresses)

CPT C10 Networking (Network Hardware and Addresses)

10th Grade

20 Qs

Database Bitesize

Database Bitesize

10th Grade

20 Qs

Unit 3 Year 7

Unit 3 Year 7

7th Grade - University

16 Qs

Security Controls Quiz

Security Controls Quiz

Assessment

Quiz

Information Technology (IT)

10th Grade

Medium

Created by

Kari Cobb

Used 1+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of security control aims to keep people out of systems and prevent attacks?

Deterrent

Corrective

Preventive

Detective

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a deterrent security control?

Intrusion detection system

Firewall rule configurations

Security awareness training

Warning signs like "No Trespassing"

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security control type is designed to alert you when a particular event occurs, such as an unauthorized user accessing a system?

Preventive

Deterrent

Detective

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security control type is put in place to satisfy the requirement for a security measure deemed too difficult or impractical to implement now?

Corrective

Compensating

Directive

Deterrent

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three fundamental principles of information security, also known as the CIA Triad?

Confidentiality, Integrity, and Authorization

Confidentiality, Integrity, and Availability

Confidentiality, Integrity, and Access Control

Confidentiality, Integrity, and Authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Zero Trust approach to network security emphasize?

Implicit trust zones based on network perimeter defenses.

Trusting all users and devices within the network perimeter.

Continuous evaluation of access requests and granting only minimum necessary permissions.

Providing broad access privileges to users once inside the network.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a physical security control that channels people through a specific point while prohibiting vehicle access?

Access Badge

Fences and Signs

Video Surveillance

Access Control Vestibule

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?