placeholder image to represent content

EDM Quiz For the Month of September 2024

Quiz by David

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
20 questions
Show answers
  • Q1

    Common types of data breaches (e.g., unauthorized access, theft, hacking) 

    true
    false
    True or False
    30s
  • Q2

    Web Access Firewall – WAF focuses on  

    Layer 3 of the OSI Model

    None of the above

    Layer 1 of the OSI Model

    Layer 5 of the OSI Model

    30s
  • Q3

    Enterprise Data Centers. Owned and operated by individual organizations for their own use. 

    true
    false
    True or False
    30s
  • Q4

    AAA stands for Authentication, Authorization and Accounting

    true
    false
    True or False
    30s
  • Q5

    SIEM Stands for

    Security Information and Event Management

    Security Information and Ethics Management

    Specific Information and Event Management

    Security Information and Energy Management

    30s
  • Q6

    A Network Management System (NMS) is a comprehensive platform designed  to back up the performance and health of a network 

    false
    true
    True or False
    30s
  • Q7

    Email security is the practice of protecting email accounts and communications from unauthorized access, loss, or compromise.

    true
    false
    True or False
    30s
  • Q8

    DLP means

    Data Less Prevention

    Data Large Prevention

    Data Loss Prevention

    Date Loss Prevention

    30s
  • Q9

    DAM stands for 

    Database Anti Monitoring

    Database Activity Monitoring

    Database Activity Mentoring

    Date Activity Monitoring

    30s
  • Q10

    MFA does not support more than one authentication method

    false
    true
    True or False
    30s
  • Q11

    IRM is used

    All of the above

    To prevent data leaks or unauthorized sharing

    To safeguard intellectual property.

    To comply with regulations like GDPR or HIPAA

    30s
  • Q12

      Cloud computing refers to the delivery of computing services—like storage, servers,

      databases, networking, software, and analytics—over the internet

    true
    false
    True or False
    30s
  • Q13

    IT Asset Management (ITAM) is the practice of managing and optimizing the full lifecycle of IT assets within an organization, from acquisition to disposal

    true
    false
    True or False
    30s
  • Q14

    A Web Application Firewall (WAF) is a security system designed to protect web applications by monitoring, filtering, and blocking HTTP/HTTPS traffic to and from a web application which focusses on 6th Layer of the OSI Model 

    false
    true
    True or False
    30s
  • Q15

    PIM and PAM are Subset of Identity Access Management 

    true
    false
    True or False
    30s

Teachers give this quiz to your class