Unit 6 Exam Part 2

Unit 6 Exam Part 2

12th Grade

33 Qs

quiz-placeholder

Similar activities

UAS AIJ XI TKJ 2019/2020

UAS AIJ XI TKJ 2019/2020

12th Grade

35 Qs

033_Hardware Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

033_Hardware Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

9th Grade - University

31 Qs

cybersecurity worksheet

cybersecurity worksheet

9th Grade - University

29 Qs

A+ 220-1001 1 1/3

A+ 220-1001 1 1/3

9th Grade - Professional Development

30 Qs

CompTIA Security + (Part 1)

CompTIA Security + (Part 1)

12th Grade

34 Qs

Ch. 10.2 - 10.4

Ch. 10.2 - 10.4

9th - 12th Grade

30 Qs

Networking Basics

Networking Basics

9th - 12th Grade

32 Qs

CyberOps Modules 24-25

CyberOps Modules 24-25

12th Grade

35 Qs

Unit 6 Exam Part 2

Unit 6 Exam Part 2

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Nathan Krahn

Used 1+ times

FREE Resource

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. What role does physical security play in cybersecurity regarding device placement?
Minimizing Communication Delays
Securing access to devices
Reducing the attack surface
Optimizing device placement

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. What is the primary purpose of security zones in network segmentation?
To minimize communication delays
To secure access to devices
To isolate valuable assets and limit potential damage from a breach
To optimize device placement

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3. What does the attack surface represent in cybersecurity?
The potential entry points for attackers to infiltrate a network
The way different parts of the IT infrastructure are linked together
The specific channels used for network communication
The level of trust associated with different network resources

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. How can connectivity be secured to improve cybersecurity?
Maximizing connections to increase redundancy
Segmenting the network to isolate critical resources
Opening all ports for easier access
Minimizing connections and securing them

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. What are the two failure modes commonly considered in cybersecurity architecture?
Passive and active
Failure-open and failure-closed
Inline and tap/monitor
Port security and 802.1x

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6. Which type of device actively processes and manipulates data, influencing other devices?
Passive device
Inline device
Active device
Tap/Monitor device

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. What is the function of an inline device in cybersecurity architecture?
Actively processing and inspecting all traffic that flows through it
Passing data without processing or manipulating it
Blocking traffic if something goes wrong

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?