Cybersecurity MCQs Quiz

Cybersecurity MCQs Quiz

University

20 Qs

quiz-placeholder

Similar activities

Access to the Cloud

Access to the Cloud

University

15 Qs

network security-1

network security-1

12th Grade - University

20 Qs

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

9th Grade - University

20 Qs

SYO 701 FIREWALL Module FC

SYO 701 FIREWALL Module FC

University

20 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

Quiz 15 questions for Networking Devices

Quiz 15 questions for Networking Devices

10th Grade - University

15 Qs

Computer Security Measures

Computer Security Measures

12th Grade - University

19 Qs

Network Security 2

Network Security 2

University

21 Qs

Cybersecurity MCQs Quiz

Cybersecurity MCQs Quiz

Assessment

Quiz

Computers

University

Easy

Created by

ANIKET PAUL

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main idea behind the Defense in Depth strategy?

Encrypting data at rest only

Using antivirus as the only defense

Creating multiple layers of security

Outsourcing security to third-party providers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of control used in Defense in Depth?

Physical Control

Mental Control

Technical Control

Administrative Control

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a technical control in Defense in Depth?

Lock on a server room door

Employee awareness training

Two-Factor Authentication (2FA)

Security guard patrolling the premises

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of a DMZ (Demilitarized Zone) in network security?

Encrypts email communications

Monitors employee productivity

Acts as a buffer zone between external and internal networks

Blocks access to social media

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which layer is responsible for protecting individual devices like laptops and servers?

Network Layer

Data Layer

Endpoint Security

Application Layer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a benefit of the Zero Trust Security Model?

Assumes everything inside the network is safe

Allows unrestricted access for trusted devices

Requires continuous verification of all resources

Uses only physical security measures

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of Web Application Firewalls (WAFs)?

Encrypt network traffic

Filter data at the physical layer

Protect applications from web-based threats

Monitor VPN traffic

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?