placeholder image to represent content

W07: CP03 Quiz (CSSD0223)

Quiz by Bryan N. Manalaotao

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
15 questions
Show answers
  • Q1
    What type of malware protection employs analysis of suspicious behavior?
    Signature-based
    Behavior-based
    Heuristics-based
    Firewall-based
    30s
  • Q2
    Which of the following is NOT a component of endpoint security?
    Data encryption
    Host-based firewalls
    Email Security Appliance
    Network infrastructure
    20s
  • Q3
    What is the primary purpose of a host-based firewall?
    Monitoring network traffic
    Analyzing network protocols
    Controlling incoming and outgoing connections on a computer
    Scanning for malware signatures
    20s
  • Q4
    Which of the following is an example of a host-based intrusion detection system (HIDS)?
    Network Admission Control (NAC)
    Cisco AMP
    TCP Wrapper
    CERT
    20s
  • Q5
    What does HIDS stand for?
    Host-Based Intrusion Detection System
    Host-Integrated Detection System
    Host-Initiated Security Protocol
    Host-Induced Defense Strategy
    20s
  • Q6
    Which tool is used for creating and managing application whitelists and blacklists?
    Cisco FireSIGHT
    Common Vulnerability Scoring System
    Mobile Device Management (MDM)
    Advanced Malware Protection (AMP)
    20s
  • Q7
    What does CVSS stand for?
    Common Vulnerability Scoring System
    Common Vulnerability Security System
    Critical Vulnerability Scoring System
    Common Virus Scanning System
    20s
  • Q8
    Which compliance regulation focuses on the protection of patient healthcare information?
    GLBA
    SOX
    FISMA
    HIPAA
    20s
  • Q9
    What does MDM stand for?
    Managed Device Monitoring
    Malware Detection Mechanism
    Mobile Device Management
    Mobile Data Management
    20s
  • Q10
    What is the primary purpose of vulnerability management?
    Proactively prevent exploitation of IT vulnerabilities
    Analyze network traffic patterns
    Reactively respond to security breaches
    Identify potential malware threats
    20s
  • Q11
    Which step in the Vulnerability Management Life Cycle involves categorizing assets into groups based on their criticality?
    Remediate
    Assess
    Prioritize Assets
    Discover
    20s
  • Q12
    What does ISMS stand for?
    Information Security Management System
    Information Security Monitoring System
    Integrated Security Management Service
    International Security Management Standard
    20s
  • Q13
    Which certification provides a global specification for an ISMS?
    GLBA
    ISO 27001
    PCI-DSS
    SOX
    20s
  • Q14
    What is the purpose of asset management in secure device management?
    Track location and configuration of devices and software
    Monitor network traffic
    Encrypt sensitive data
    Identify potential vulnerabilities
    20s
  • Q15
    What strategy involves accepting the risk and its consequences?
    Risk avoidance
    Risk sharing
    Risk retention
    Risk reduction
    20s

Teachers give this quiz to your class