
EDM Quiz For the Month of September 2024
Quiz by David
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
Common types of data breaches (e.g., unauthorized access, theft, hacking)
truefalseTrue or False30s - Q2
Web Access Firewall – WAF focuses on
Layer 3 of the OSI Model
None of the above
Layer 1 of the OSI Model
Layer 5 of the OSI Model
30s - Q3
Enterprise Data Centers. Owned and operated by individual organizations for their own use.
truefalseTrue or False30s - Q4
AAA stands for Authentication, Authorization and Accounting
truefalseTrue or False30s - Q5
SIEM Stands for
Security Information and Event Management
Security Information and Ethics Management
Specific Information and Event Management
Security Information and Energy Management
30s - Q6
A Network Management System (NMS) is a comprehensive platform designed to back up the performance and health of a network
falsetrueTrue or False30s - Q7
Email security is the practice of protecting email accounts and communications from unauthorized access, loss, or compromise.
truefalseTrue or False30s - Q8
DLP means
Data Less Prevention
Data Large Prevention
Data Loss Prevention
Date Loss Prevention
30s - Q9
DAM stands for
Database Anti Monitoring
Database Activity Monitoring
Database Activity Mentoring
Date Activity Monitoring
30s - Q10
MFA does not support more than one authentication method
falsetrueTrue or False30s - Q11
IRM is used
All of the above
To prevent data leaks or unauthorized sharing
To safeguard intellectual property.
To comply with regulations like GDPR or HIPAA
30s - Q12
Cloud computing refers to the delivery of computing services—like storage, servers,
databases, networking, software, and analytics—over the internet
truefalseTrue or False30s - Q13
IT Asset Management (ITAM) is the practice of managing and optimizing the full lifecycle of IT assets within an organization, from acquisition to disposal
truefalseTrue or False30s - Q14
A Web Application Firewall (WAF) is a security system designed to protect web applications by monitoring, filtering, and blocking HTTP/HTTPS traffic to and from a web application which focusses on 6th Layer of the OSI Model
falsetrueTrue or False30s - Q15
PIM and PAM are Subset of Identity Access Management
truefalseTrue or False30s