Cybersecurity MCQs Quiz

Cybersecurity MCQs Quiz

University

20 Qs

quiz-placeholder

Similar activities

Briefing Besar PIM III

Briefing Besar PIM III

University

20 Qs

Redes I- Componentes y tipos de redes

Redes I- Componentes y tipos de redes

University

20 Qs

การใช้คอมพิวเตอร์ในการจัดทำบัญชี

การใช้คอมพิวเตอร์ในการจัดทำบัญชี

University

20 Qs

Firewall and Network Security

Firewall and Network Security

University

15 Qs

Logika & Pemrograman (ID)

Logika & Pemrograman (ID)

10th Grade - Professional Development

20 Qs

DBC CHAPTER 3 - REVISION

DBC CHAPTER 3 - REVISION

University

15 Qs

Week 4

Week 4

University

15 Qs

CN_Minor2

CN_Minor2

University

20 Qs

Cybersecurity MCQs Quiz

Cybersecurity MCQs Quiz

Assessment

Quiz

Computers

University

Easy

Created by

ANIKET PAUL

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main idea behind the Defense in Depth strategy?

Encrypting data at rest only

Using antivirus as the only defense

Creating multiple layers of security

Outsourcing security to third-party providers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of control used in Defense in Depth?

Physical Control

Mental Control

Technical Control

Administrative Control

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a technical control in Defense in Depth?

Lock on a server room door

Employee awareness training

Two-Factor Authentication (2FA)

Security guard patrolling the premises

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of a DMZ (Demilitarized Zone) in network security?

Encrypts email communications

Monitors employee productivity

Acts as a buffer zone between external and internal networks

Blocks access to social media

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which layer is responsible for protecting individual devices like laptops and servers?

Network Layer

Data Layer

Endpoint Security

Application Layer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a benefit of the Zero Trust Security Model?

Assumes everything inside the network is safe

Allows unrestricted access for trusted devices

Requires continuous verification of all resources

Uses only physical security measures

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of Web Application Firewalls (WAFs)?

Encrypt network traffic

Filter data at the physical layer

Protect applications from web-based threats

Monitor VPN traffic

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?