
Cybersecurity Fundamentals Theory Test 2
Authored by ABDUL HAKIM BIN ABDUL AZIZ (PSMZA)
Information Technology (IT)
University
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the following classification of security infrastructure that refers to a structured layout of network security measures that define how different network segments and devices interact to ensure overall protection.
Devices
Media
Security topologies
Intrusion detection
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Determine the CORRECT classification of security infrastructure as described in Figure 1.
Security topologies
Intrusion detection
Security baseline
Application hardening
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Clarify the following classification of security infrastructure that refers to a minimum set of security standards or configurations that must be implemented across devices, systems, and applications to ensure a consistent security level?
Devices
Security topologies
Security baseline
Application hardening
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Referring to the statement in Figure 2, match the following infrastructure security.
A. VPN (Virtual Private Network)
B. IDS (Intrusion Detection System)
C. Honeypots
D. DMZ (Demilitarized Zone)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Clarify the following that is designed to monitor and detect suspicious activities or breaches within a network or system.
Security topologies
Intrusion detection
Security baseline
Application hardening
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Match the following security tools that are designed to deceive attackers by simulating vulnerable systems or services to detect and analyze unauthorized access attempts.
A. Firewalls
B. VPN (Virtual Private Network)
C. IDS (Intrusion Detection System)
D. Honeypots
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Referring to the statement in Figure 3, match the following security tools
A. VPN (Virtual Private Network)
B. IDS (Intrusion Detection System)
C. Honeypots
D. DMZ (Demilitarized Zone)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
FDBS Lesson 1 Quiz (Quiz #1)
Quiz
•
University
14 questions
ICT and Multimedia Quiz
Quiz
•
12th Grade - University
15 questions
INFORMATIKA KELAS 7A DAN TB
Quiz
•
7th Grade - University
15 questions
komputasi awan
Quiz
•
University
20 questions
Computer Basics Quiz
Quiz
•
7th Grade - University
20 questions
CI2214 Chapter 1
Quiz
•
University
17 questions
Brainware
Quiz
•
9th Grade - University
20 questions
Emerging Technologies
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
20 questions
Endocrine System
Quiz
•
University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
30 questions
W25: PSYCH 250 - Exam 2 Practice
Quiz
•
University
5 questions
Inherited and Acquired Traits of Animals
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University
38 questions
Unit 8 Review - Absolutism & Revolution
Quiz
•
10th Grade - University