AP CK Cybersecurity Unit 2

Quiz
•
Computers
•
12th Grade
•
Medium
Kristina Rice
Used 3+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a benefit of a defense-in-depth security strategy?
It ensures that a security breach is detected immediately.
It eliminates the need for regular security updates and patches.
It reduces the overall cost of the security measures for an organization.
It can limit the damage if one security control is bypassed by an adversary.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following can help prevent against piggybacking?
Cameras
Mantraps
Door locks
Card readers
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following explains how a deny list impacts access to a resource?
A deny list ensures that all entities are able to access a resource.
A deny list ensures that no entities are able to access a resource.
A deny list allows access to more entities compared to an allow list, as it only restricts specific ones.
A deny list restricts access to fewer entities than an allow list, as it permits all other by default.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following can help prevent attacks from moving laterally on a network and impacting other subnets?
Network segmentation
Vulnerability scanning
Network encryption
Intrusion detection system
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Review the following firewall for a server:
A network technician is trying to access the server using port 443 from a machine with an IP address of 192.168.45.37. However, they are unable to access the server.
Which of the following changes could be made to the firewall in order for the network technician to access the server?
Swap firewall rule 1 with firewall rule 10.
Swap firewall rule 3 with firewall rule 4.
Swap firewall rule 3 with firewall rule 7.
Swap firewall rule 7 with firewall rule 10.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization only allows their employees to log into a system if they are located in one of the following time zones:
Eastern standard time,
Central standard time,
Mountain standard time,
Pacific standard time.
Which of the following factors of authentication is being used to verify the identity of the user?
Location factor
Biometric factor
Possession factor
Knowledge factor
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is contained within an anti-malware software?
A virtual private network (VPN)
A desk defragmenter
A malware encryption tool
A malware signature database
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Cybersecurity Quiz

Quiz
•
12th Grade
11 questions
The Broadband Internet Connection

Quiz
•
9th Grade - University
10 questions
BTEC cyber security

Quiz
•
9th - 12th Grade
10 questions
computer networking -2

Quiz
•
12th Grade
12 questions
CamTech Network Security

Quiz
•
8th - 12th Grade
15 questions
GCSE CS Networking Devices Do Now

Quiz
•
12th Grade
10 questions
Unit 11 Topic 7 Antivirus and Firewalls

Quiz
•
11th - 12th Grade
10 questions
Technical Terms - Hardware (A-Z) - Bridge

Quiz
•
12th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade
19 questions
AP CSP Unit 1 Review (code.org)

Quiz
•
10th - 12th Grade