Cybersecurity MCQs Quiz

Cybersecurity MCQs Quiz

University

20 Qs

quiz-placeholder

Similar activities

Test PKS 1 - Modul 2

Test PKS 1 - Modul 2

University

20 Qs

Soal AIJ bulan Agustus 2019 kls xii

Soal AIJ bulan Agustus 2019 kls xii

University

20 Qs

LỚP 12 - CHỦ ĐỀ B - BÀI 1 + 2 MẠNG MT VÀ GIAO THỨC

LỚP 12 - CHỦ ĐỀ B - BÀI 1 + 2 MẠNG MT VÀ GIAO THỨC

10th Grade - University

18 Qs

ICT Unit-2

ICT Unit-2

University

20 Qs

Quiz 1 CCE

Quiz 1 CCE

University

15 Qs

ADB Quiz #1

ADB Quiz #1

University

15 Qs

Computer and Other Human Inventions

Computer and Other Human Inventions

University

15 Qs

Robotics Prelim

Robotics Prelim

University

15 Qs

Cybersecurity MCQs Quiz

Cybersecurity MCQs Quiz

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

ANIKET PAUL

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main idea behind the Defense in Depth strategy?

Encrypting data at rest only

Using antivirus as the only defense

Creating multiple layers of security

Outsourcing security to third-party providers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of control used in Defense in Depth?

Physical Control

Mental Control

Technical Control

Administrative Control

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a technical control in Defense in Depth?

Lock on a server room door

Employee awareness training

Two-Factor Authentication (2FA)

Security guard patrolling the premises

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of a DMZ (Demilitarized Zone) in network security?

Encrypts email communications

Monitors employee productivity

Acts as a buffer zone between external and internal networks

Blocks access to social media

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which layer is responsible for protecting individual devices like laptops and servers?

Network Layer

Data Layer

Endpoint Security

Application Layer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a benefit of the Zero Trust Security Model?

Assumes everything inside the network is safe

Allows unrestricted access for trusted devices

Requires continuous verification of all resources

Uses only physical security measures

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of Web Application Firewalls (WAFs)?

Encrypt network traffic

Filter data at the physical layer

Protect applications from web-based threats

Monitor VPN traffic

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?