Search Header Logo

CySA Module 12 - Data Protection and Privacy

Authored by Jose Manuel Rios

Information Technology (IT)

9th Grade

CySA Module 12 - Data Protection and Privacy
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network engineer is designing a new subnet to be deployed in the neighboring building that her organization just purchased. She wants to ensure that certain protocols are not allowed to communicate between the existing subnets and the new subnet. Which of the following should the network engineer configure on the router connecting the two buildings?

DAC

ACL

MAC

SID

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would be the result of a user with the IP address of 10.15.30.45 attempting to access a website located at 10.20.30.40 if a router or firewall is located between the two subnets using the extended ACL below? 10 PERMIT IP ANY ANY 20 PERMIT TCP 10.15.30.0 0.0.0.255 10.20.30.0 0.0.0.255 eq 25 20 PERMIT TCP 10.15.30.0 0.0.0.255 10.20.30.0 0.0.0.255 eq 143 30 DENY IP 10.15.30.0 0.0.0.255 10.20.30.0 0.0.0.255 eq 80 40 DENY IP 10.15.30.0 0.0.0.255 10.20.30.0 0.0.0.255 eq 443

Access is permitted

Access is denied

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The user would be able to access email, but not the website.

The user would be able to access email, but not the website.

The user would be able to access the website successfully.

The user would be able to access the HTTP version of the website, but not HTTPS.

The user would be able to access the HTTPS version of the website, but not HTTP.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A consultant is hired to analyze some of the most critical and confidential systems in an organization. Which of the following most likely will be necessary as part of the work?

SLA

NDA

OLA

HIPAA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Justin has just received a report from a security consultant with a line item stating that it is possible that employees potentially could send customer credit card numbers and social security numbers to their personal e-mail addresses and use them to engage in identity theft. Which of the following should Justin consider as a solution to this serious security issue?

IDS

DLP

IPS

NAT

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Faruq is an administrator for a large movie production studio. He has just been sent the mastered version of the latest release, which needs to be available on the company's online rental platform in the near future. Which of the following should he ensure is embedded in the file so that only authorized customers are allowed to watch the movie?

DPO

DRP

Data masking

DRM

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Stan has been tasked with ensuring that his company's data remains secure. As such, he wants to be able to prevent tablets and other devices from accessing certain systems unless the devices are physically on the company's multi-building HQ campus. Which of the following might he decide to implement as a solution?

Geoproximity routing

Geolanding

Geofencing

Geocaching

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?