Tip

Tap
a student's name
below to see what they need help with
Quizalize logo
placeholder image to represent content

W07: CP03 Quiz (CSSD0223)

Quiz by Bryan N. Manalaotao

Feel free to use or edit the questions

includes Teacher and Student dashboards

Measure skills
from any curriculum

Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.

Q 1/15
Score 0
What type of malware protection employs analysis of suspicious behavior?
30
Signature-based
Behavior-based
Heuristics-based
Firewall-based

15 questions

Q.What type of malware protection employs analysis of suspicious behavior?
1
30 sec
Q.Which of the following is NOT a component of endpoint security?
2
20 sec
Q.What is the primary purpose of a host-based firewall?
3
20 sec
Q.Which of the following is an example of a host-based intrusion detection system (HIDS)?
4
20 sec
Q.What does HIDS stand for?
5
20 sec
Q.Which tool is used for creating and managing application whitelists and blacklists?
6
20 sec
Q.What does CVSS stand for?
7
20 sec
Q.Which compliance regulation focuses on the protection of patient healthcare information?
8
20 sec
Q.What does MDM stand for?
9
20 sec
Q.What is the primary purpose of vulnerability management?
10
20 sec
Q.Which step in the Vulnerability Management Life Cycle involves categorizing assets into groups based on their criticality?
11
20 sec
Q.What does ISMS stand for?
12
20 sec
Q.Which certification provides a global specification for an ISMS?
13
20 sec
Q.What is the purpose of asset management in secure device management?
14
20 sec
Q.What strategy involves accepting the risk and its consequences?
15
20 sec

Give this quiz to my class