
W07: CP03 Quiz (CSSD0223)
Quiz by Bryan N. Manalaotao
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
15 questions
Show answers
- Q1What type of malware protection employs analysis of suspicious behavior?Signature-basedBehavior-basedHeuristics-basedFirewall-based30s
- Q2Which of the following is NOT a component of endpoint security?Data encryptionHost-based firewallsEmail Security ApplianceNetwork infrastructure20s
- Q3What is the primary purpose of a host-based firewall?Monitoring network trafficAnalyzing network protocolsControlling incoming and outgoing connections on a computerScanning for malware signatures20s
- Q4Which of the following is an example of a host-based intrusion detection system (HIDS)?Network Admission Control (NAC)Cisco AMPTCP WrapperCERT20s
- Q5What does HIDS stand for?Host-Based Intrusion Detection SystemHost-Integrated Detection SystemHost-Initiated Security ProtocolHost-Induced Defense Strategy20s
- Q6Which tool is used for creating and managing application whitelists and blacklists?Cisco FireSIGHTCommon Vulnerability Scoring SystemMobile Device Management (MDM)Advanced Malware Protection (AMP)20s
- Q7What does CVSS stand for?Common Vulnerability Scoring SystemCommon Vulnerability Security SystemCritical Vulnerability Scoring SystemCommon Virus Scanning System20s
- Q8Which compliance regulation focuses on the protection of patient healthcare information?GLBASOXFISMAHIPAA20s
- Q9What does MDM stand for?Managed Device MonitoringMalware Detection MechanismMobile Device ManagementMobile Data Management20s
- Q10What is the primary purpose of vulnerability management?Proactively prevent exploitation of IT vulnerabilitiesAnalyze network traffic patternsReactively respond to security breachesIdentify potential malware threats20s
- Q11Which step in the Vulnerability Management Life Cycle involves categorizing assets into groups based on their criticality?RemediateAssessPrioritize AssetsDiscover20s
- Q12What does ISMS stand for?Information Security Management SystemInformation Security Monitoring SystemIntegrated Security Management ServiceInternational Security Management Standard20s
- Q13Which certification provides a global specification for an ISMS?GLBAISO 27001PCI-DSSSOX20s
- Q14What is the purpose of asset management in secure device management?Track location and configuration of devices and softwareMonitor network trafficEncrypt sensitive dataIdentify potential vulnerabilities20s
- Q15What strategy involves accepting the risk and its consequences?Risk avoidanceRisk sharingRisk retentionRisk reduction20s