AP CK Cybersecurity Unit 2

AP CK Cybersecurity Unit 2

12th Grade

10 Qs

quiz-placeholder

Similar activities

TIK KLS 7-8 PAS Genap 2022-2023

TIK KLS 7-8 PAS Genap 2022-2023

9th - 12th Grade

15 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Alapismeretek

Alapismeretek

7th - 12th Grade

10 Qs

Scratch

Scratch

KG - Professional Development

10 Qs

Java: repetition control structure for & while

Java: repetition control structure for & while

10th - 12th Grade

10 Qs

Trò chơi ôn tập Tin 12 lần 1

Trò chơi ôn tập Tin 12 lần 1

12th Grade

10 Qs

Review

Review

9th - 12th Grade

10 Qs

G7 - Ôn tập C1,2

G7 - Ôn tập C1,2

KG - University

10 Qs

AP CK Cybersecurity Unit 2

AP CK Cybersecurity Unit 2

Assessment

Quiz

Computers

12th Grade

Practice Problem

Medium

Created by

Kristina Rice

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a benefit of a defense-in-depth security strategy?

It ensures that a security breach is detected immediately.

It eliminates the need for regular security updates and patches.

It reduces the overall cost of the security measures for an organization.

It can limit the damage if one security control is bypassed by an adversary.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can help prevent against piggybacking?

Cameras

Mantraps

Door locks

Card readers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following explains how a deny list impacts access to a resource?

A deny list ensures that all entities are able to access a resource.

A deny list ensures that no entities are able to access a resource.

A deny list allows access to more entities compared to an allow list, as it only restricts specific ones.

A deny list restricts access to fewer entities than an allow list, as it permits all other by default.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can help prevent attacks from moving laterally on a network and impacting other subnets?

Network segmentation

Vulnerability scanning

Network encryption

Intrusion detection system

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Review the following firewall for a server:

A network technician is trying to access the server using port 443 from a machine with an IP address of 192.168.45.37. However, they are unable to access the server.

Which of the following changes could be made to the firewall in order for the network technician to access the server?

Swap firewall rule 1 with firewall rule 10.

Swap firewall rule 3 with firewall rule 4.

Swap firewall rule 3 with firewall rule 7.

Swap firewall rule 7 with firewall rule 10.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization only allows their employees to log into a system if they are located in one of the following time zones:

Eastern standard time,

Central standard time,

Mountain standard time,

Pacific standard time.

Which of the following factors of authentication is being used to verify the identity of the user?

Location factor

Biometric factor

Possession factor

Knowledge factor

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is contained within an anti-malware software?

A virtual private network (VPN)

A desk defragmenter

A malware encryption tool

A malware signature database

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?