From Integrity to Exposure: A Modern cyber security approach

From Integrity to Exposure: A Modern cyber security approach

Professional Development

10 Qs

quiz-placeholder

Similar activities

Anime Quiz 2 (Special Takagi-San)

Anime Quiz 2 (Special Takagi-San)

Professional Development

10 Qs

POST TEST ISO 9001 (BEAT ICT 2)

POST TEST ISO 9001 (BEAT ICT 2)

Professional Development

15 Qs

Health and Safety 1

Health and Safety 1

Professional Development

14 Qs

Sistem Mutu Industri Farmasi, Dokumentasi, Validasi

Sistem Mutu Industri Farmasi, Dokumentasi, Validasi

University - Professional Development

8 Qs

Módulo de controles

Módulo de controles

Professional Development

12 Qs

Digital Marathon 5/7: HANA Pop Quiz!

Digital Marathon 5/7: HANA Pop Quiz!

Professional Development

15 Qs

GVA QUIZ 1

GVA QUIZ 1

Professional Development

15 Qs

LAT2. Trivial Quiz (TM PE 303)

LAT2. Trivial Quiz (TM PE 303)

Professional Development

15 Qs

From Integrity to Exposure: A Modern cyber security approach

From Integrity to Exposure: A Modern cyber security approach

Assessment

Quiz

Specialty

Professional Development

Medium

Created by

Chrisvito Arden

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a common challenge that Data Security Posture Management (DSPM) tools aim to solve?

.

Apakah cabaran lazim yang cuba diselesaikan oleh alat Data Security Posture Management (DSPM)?

Malware protection

.

Perlindungan daripada perisian hasad

Tracking firewall performance

.

Menjejaki prestasi firewall

Identifying and protecting sensitive data in shared environments

.

Mengenal pasti dan melindungi data sensitif dalam persekitaran kongsi

Monitoring DNS traffic

.

Memantau trafik DNS

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

How can a school find out if internal sensitive student data is accessible from outside when it is not supposed to be?

.

Bagaimanakah sesebuah sekolah boleh mengetahui jika data pelajar dalaman yang sensitif boleh diakses dari luar walaupun ia tidak sepatutnya?

Continuously scan all storage and apps for exposed data

.

Imbas semua storan dan aplikasi secara berterusan untuk data yang terdedah

Block all USB devices on campus

.

Sekat semua peranti USB di kampus

Require students to use complex passwords

.

Wajibkan pelajar menggunakan kata laluan yang kompleks

Disable Wi-Fi after school hours

.

Lumpuhkan Wi-Fi selepas waktu sekolah

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

How long might it take to manually detect unauthorized system changes without proper FIM/SCM?

.

Tanpa alat FIM/SCM yang sesuai, berapa lama biasanya diambil untuk mengesan perubahan sistem tanpa kebenaran secara manual?

Minutes to hours with alerts

.

Beberapa minit hingga jam dengan sistem amaran

Days to weeks of manual log review

.

Beberapa hari hingga minggu melalui semakan log manual

Seconds with manual inspection

.

Beberapa saat dengan pemeriksaan manual

Never, since manual review is foolproof

.

Tak pernah, sebab semakan manual dianggap mencukupi

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

"Enforcing compliance with security policies and baselines."

Which solutions help the organization to perform this function?

.

"Menguatkuasakan pematuhan terhadap dasar dan garis panduan keselamatan.”
Penyelesaian manakah yang paling sesuai untuk fungsi ini?

Application Security Assessment

.

Penilaian Keselamatan Aplikasi

Continuous Threat Exposure Management (CTEM)

Security Configuration Management (SCM)

Data Security Posture Management (DSPM)

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

"After a new vulnerability is disclosed, it ranks vulnerabilities by exploitability and impact for prioritization."

Which solution performs this functionality?

.

"Selepas satu kelemahan keselamatan baru didedahkan, ia menyusun kelemahan berdasarkan keboleheksploitan dan impak untuk keutamaan."
Penyelesaian manakah yang menjalankan fungsi ini?

Security Configuration Management (SCM)

Continuous Threat Exposure Management (CTEM)

Data Security Posture Management (DSPM)

Application Security Assessment

.

Penilaian Keselamatan Aplikasi

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

"During a recent audit, your security team noticed unauthorized changes to the system."

Which tool would best help detect and alert on such changes in real time?

.

"Semasa audit baru-baru ini, pasukan keselamatan anda mengesan perubahan sistem tanpa kebenaran."
Alat manakah yang paling sesuai untuk mengesan dan memberi amaran tentang perubahan tersebut secara masa nyata?

Firewall

Continuous Threat Exposure Management (CTEM)

Data Security Posture Management (DSPM)

File Integrity Monitoring (FIM)

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

"The teachers of a school stores sensitive student data across multiple cloud platforms."

How can DSPM help?

.

"Guru-guru di sebuah sekolah menyimpan data pelajar sensitif merentasi pelbagai platform awan."
Bagaimanakah DSPM boleh membantu?

By tracking where sensitive data is stored and who has access using AI

.

Dengan menjejak lokasi simpanan data sensitif dan siapa yang mempunyai akses menggunakan AI

By blocking all external cloud connections

.

Dengan menyekat semua sambungan awan luar

By encrypting all files manually

.

Dengan menyulitkan semua fail secara manual

By limiting internet speeds for cloud users

.

Dengan mengehadkan kelajuan internet untuk pengguna awan

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?