Cybersecurity v1.1 Module 6
Quiz
This quiz covers the content of the videos presented in Cybersecurity
Module 6. This quiz is designed for practice. You will be allowed
multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz. In some
task types, partial credit scoring is allowed to foster learning. Please note
that on tasks with multiple answers, points can be deducted
for selecting incorrect options.
Short answer or essay questions may appear on
some of the quizzes. These questions are designed for self-assessment and
reflection and are not scored. Sample answers are provided
for self-evaluation.
At the completion of the quiz, some items may display feedback. The feedback
will reference the source of the content. Example: Refer to curriculum
topic: 1.2.0 - indicates that the source of the material for this task is
in module 1, presentation 2.
Pregunta 1
Within an Enterprise Security Architecture, the Security Technology
Architecture layer consists of five components. Three of these components are
the framework, the conceptual requirements, and the logical requirements. What are the other two components?
(Choose two.)
|
asset
management
|
|
|
event
management
|
|
implementation
of the infrastructure
|
|
|
physical
devices
|
|
standards
and procedures
|
Refer to the exhibit. Rearrange the letters to fill in the blank.
A recommended Enterprise Security Architecture consists of 5 layers; Security Drivers, Security Program Management, Security Governance, Security , and Security Technology Architecture.
A recommended Enterprise Security Architecture consists of 5 layers; Security Drivers, Security Program Management, Security Governance, Security , and Security Technology Architecture.
True or False?
Recent trends show that those who conduct cyberattacks are getting better at evading detection.
Recent trends show that those who conduct cyberattacks are getting better at evading detection.
|
true
|
|
|
false
|
List three (3) important facts about the Enterprise Security Architecture.
Fill in the blank.
A recent study found that 1 out of children in China aspire to become hackers.
A recent study found that 1 out of children in China aspire to become hackers.
What are the three strategic end goals of cybersecurity? (Choose three.)
|
stopping the creation of malware
|
|
|
preventing people from becoming hackers
|
|
preventing
strategic collapse
|
|
|
deterring
and disrupting hackers
|
|
protecting
information assets
|
No hay comentarios:
Publicar un comentario