Cybersecurity Fundamentals Theory Test 2

Cybersecurity Fundamentals Theory Test 2

University

19 Qs

quiz-placeholder

Similar activities

Network Protocols Quiz

Network Protocols Quiz

University

14 Qs

ISP and Data Packets Part 2

ISP and Data Packets Part 2

University

15 Qs

Network Topologies and Key Network Components

Network Topologies and Key Network Components

10th Grade - University

15 Qs

ISF 2

ISF 2

University

20 Qs

OSS (QUIZ 8) Security and Protection

OSS (QUIZ 8) Security and Protection

University

15 Qs

NET102:  Quiz No. 1

NET102: Quiz No. 1

University

20 Qs

Computer Networks

Computer Networks

University

24 Qs

Incident Response and Security Quiz 3

Incident Response and Security Quiz 3

University

19 Qs

Cybersecurity Fundamentals Theory Test 2

Cybersecurity Fundamentals Theory Test 2

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

ABDUL HAKIM BIN ABDUL AZIZ (PSMZA)

Used 3+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the following classification of security infrastructure that refers to a structured layout of network security measures that define how different network segments and devices interact to ensure overall protection.

Devices

Media

Security topologies

Intrusion detection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Determine the CORRECT classification of security infrastructure as described in Figure 1.

Security topologies

Intrusion detection

Security baseline

Application hardening

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clarify the following classification of security infrastructure that refers to a minimum set of security standards or configurations that must be implemented across devices, systems, and applications to ensure a consistent security level?

Devices

Security topologies

Security baseline

Application hardening

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Referring to the statement in Figure 2, match the following infrastructure security.

A.   VPN (Virtual Private Network)

B.    IDS (Intrusion Detection System)

C.   Honeypots

D.   DMZ (Demilitarized Zone)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clarify the following that is designed to monitor and detect suspicious activities or breaches within a network or system.

Security topologies

Intrusion detection

Security baseline

Application hardening

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Match the following security tools that are designed to deceive attackers by simulating vulnerable systems or services to detect and analyze unauthorized access attempts.

A.    Firewalls

B.    VPN (Virtual Private Network)

C.   IDS (Intrusion Detection System)

D.   Honeypots

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Referring to the statement in Figure 3, match the following security tools

A.    VPN (Virtual Private Network)

B.    IDS (Intrusion Detection System)

C.   Honeypots

D.   DMZ (Demilitarized Zone)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)