Search Header Logo

Cybersecurity Fundamentals Theory Test 2

Authored by ABDUL HAKIM BIN ABDUL AZIZ (PSMZA)

Information Technology (IT)

University

Used 7+ times

Cybersecurity Fundamentals Theory Test 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the following classification of security infrastructure that refers to a structured layout of network security measures that define how different network segments and devices interact to ensure overall protection.

Devices

Media

Security topologies

Intrusion detection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Determine the CORRECT classification of security infrastructure as described in Figure 1.

Security topologies

Intrusion detection

Security baseline

Application hardening

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clarify the following classification of security infrastructure that refers to a minimum set of security standards or configurations that must be implemented across devices, systems, and applications to ensure a consistent security level?

Devices

Security topologies

Security baseline

Application hardening

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Referring to the statement in Figure 2, match the following infrastructure security.

A.   VPN (Virtual Private Network)

B.    IDS (Intrusion Detection System)

C.   Honeypots

D.   DMZ (Demilitarized Zone)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clarify the following that is designed to monitor and detect suspicious activities or breaches within a network or system.

Security topologies

Intrusion detection

Security baseline

Application hardening

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Match the following security tools that are designed to deceive attackers by simulating vulnerable systems or services to detect and analyze unauthorized access attempts.

A.    Firewalls

B.    VPN (Virtual Private Network)

C.   IDS (Intrusion Detection System)

D.   Honeypots

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Referring to the statement in Figure 3, match the following security tools

A.    VPN (Virtual Private Network)

B.    IDS (Intrusion Detection System)

C.   Honeypots

D.   DMZ (Demilitarized Zone)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?