Unit 2 Test: Configuring Security Controls

Unit 2 Test: Configuring Security Controls

20 Qs

quiz-placeholder

Similar activities

FINN11B - Regulation of Commercial Banks

FINN11B - Regulation of Commercial Banks

University

25 Qs

Corporations

Corporations

KG - University

15 Qs

Level 1 - Networking

Level 1 - Networking

KG - University

17 Qs

CH07 SECURITY AND ETHICAL CHALLENGES

CH07 SECURITY AND ETHICAL CHALLENGES

University

20 Qs

Level 5 - Security Zones Quiz

Level 5 - Security Zones Quiz

KG - University

15 Qs

1.3 Networks

1.3 Networks

KG - University

20 Qs

05.5 - Third Party Politics

05.5 - Third Party Politics

11th Grade

20 Qs

Level 5 - Crypto Quiz 1 of 2

Level 5 - Crypto Quiz 1 of 2

KG - University

20 Qs

Unit 2 Test: Configuring Security Controls

Unit 2 Test: Configuring Security Controls

Assessment

Quiz

others

Easy

Created by

Quizizz Content

Used 10+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the Bell-LaPadula model, what does the Simple Security property state?
Subjects can read any object
Subjects may not write to objects below their level
Subjects may not read objects above their level
Subjects can modify objects at their own level

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can help prevent attacks from moving laterally on a network and impacting other subnets?
Network segmentation
Vulnerability scanning
Network encryption
Intrusion detection system

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the numeric permission '7' represent in Linux file permissions?
Read only
Write only
Read and write
Read, write, and execute

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If an adversary has already cracked a user’s password, which of the following security requirements could result in the adversary getting locked out?
Requiring at least one symbol in a password
Requiring a password history to prevent reuse
Requiring a maximum password age
Requiring a maximum password length

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What factors influence the placement of firewalls in a network?
Number of network segments
Type of data encryption
Amount of stored data
Internet speed

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important for organizations to regularly review and update their security policies?
To keep employees busy
To impress clients
To address evolving cybersecurity threats
To reduce printing costs

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a deny list function in network security?
It allows access to all entities
It denies access to specific entities
It encrypts all traffic
It stores user credentials

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?