
Part 2 Security Solutions (Scenario)
Quiz by Cessa De Guzman
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
A company wants to protect its web applications from SQL injection and cross-site scripting attacks. Which security solution should they implement?
Web Application Firewall (WAF)
Firewall
Data Loss Prevention (DLP)
Intrusion Detection System (IDS)
45s - Q2
An organization needs a solution to manage and monitor network traffic, filter content, and detect intrusions. Which integrated security solution should they use?
Web Application Firewall (WAF)
Identity and Access Management (IAM)
Intrusion Detection System (IDS)
Unified Threat Management (UTM)
45s - Q3
A business requires a system to detect and prevent malicious activities in real-time, such as blocking an ongoing attack. Which solution is most appropriate?
Intrusion Prevention System (IPS)
Intrusion Detection System (IDS)
Vulnerability Management
Data Loss Prevention (DLP)
45s - Q4
A company needs to monitor, collect, and analyze security event data from various sources in real-time to respond to security incidents promptly. Which solution should they implement?
Security Information and Event Management (SIEM)
Web Application Firewall (WAF)
Unified Threat Management (UTM)
Identity and Access Management (IAM)
45s - Q5
An enterprise is looking to ensure that sensitive data does not leave the network through email or other means. Which security solution is best suited for this need?
Intrusion Prevention System (IPS)
Data Loss Prevention (DLP)
Security Information and Event Management (SIEM)
Web Application Firewall (WAF)
45s - Q6
A healthcare organization needs to ensure that only authorized personnel can access patient records and sensitive information. Which security solution should they focus on implementing?
Unified Threat Management (UTM)
Intrusion Detection System (IDS)
Web Application Firewall (WAF)
Identity and Access Management (IAM)
45s - Q7
A financial institution is migrating its services to the cloud and needs to ensure data encryption and privacy. Which security solution is most critical in this scenario?
Cloud Security
Vulnerability Management
Data Loss Prevention (DLP)
Intrusion Detection System (IDS)
45s - Q8
A company wants to continuously scan its systems for security weaknesses and apply patches to mitigate potential threats. Which solution should they implement?
Web Application Firewall (WAF)
Unified Threat Management (UTM)
Intrusion Detection System (IDS)
Vulnerability Management
45s - Q9
An e-commerce website needs to block unauthorized access attempts while also performing deep packet inspection for malware. Which firewall solution is most suitable?
Next-Generation Firewall (NGFW)
Intrusion Prevention System (IPS)
Web Application Firewall (WAF)
Packet-Filtering Firewall
45s - Q10
A large enterprise wants to integrate multiple security functions such as firewall, VPN, antivirus, and content filtering into a single device. Which solution should they choose?
Unified Threat Management (UTM)
Identity and Access Management (IAM)
Web Application Firewall (WAF)
Intrusion Detection System (IDS)
45s