Search Header Logo
Unit 1: Section D Review (AAQ)

Unit 1: Section D Review (AAQ)

Assessment

Presentation

Information Technology (IT)

Vocational training

Hard

Created by

Kimberly O'Brien

FREE Resource

11 Slides • 11 Questions

1

media

2

Multiple Choice

Information is being taken from the CEO's computer on a regular basis, even though passwords are being changed weekly. After checking the computer, you discover a keylogger program.

Which of the following attacks was being used to get Data?

1

Snooping

2

Social Engineering

3

Wiretapping

4

Dos

3

media

4

Open Ended

What are three examples of how you've encountered cybersecurity in your daily life this week?

5

media

6

Multiple Select

What are the five external threats to data security mentioned in the image?

1

Viruses and Malware

2

Unauthorized Access

3

Accidental Damage

4

Social Engineering

5

Natural Disasters

7

media

8

Multiple Choice

As a member of a Computer Security Incident Response Team (CSIRT), you are involved in collecting data for incident response activities. When the CSIRT is dealing with an advanced persistent threat (APT) targeting your organization, which of the following methods is likely to be particularly useful in gathering information about the threat actor?

1

Analyzing network traffic for signs of command-and-control activity

2

Implementing password changes

3

Increasing cloud storage

4

Disabling firewall rules

9

media

10

Multiple Choice

What are the potential consequences of security breaches for individuals and organizations?

1

Identity theft

2

Financial fraud

3

Regulatory penalties

4

All of the above

11

media

12

Multiple Choice

What are the different methods of access control mentioned in the image?

1

File Permissions

2

Access Levels

3

Physical Security

4

All of the above

13

media

14

Open Ended

Explain why simply having backups isn't enough—why must organisations regularly test their recovery procedures? Write 2-3 sentences.

15

media

16

Multiple Choice

Which function of firewall protection inspects incoming and outgoing network packets?

1

Traffic Monitoring

2

Rule-Based Filtering

3

Intrusion Prevention

4

Activity Logging

17

media

18

Multiple Choice

What is the purpose of Transmission Encryption?

1

To protect data at rest

2

To secure data in transit

3

To encrypt websites

4

To store data securely

19

media

20

Multiple Choice

What are the key takeaways regarding data protection discussed in the lesson?

1

Threats are everywhere

2

Defence in depth

3

Impact is serious

4

All of the above

21

media

22

Open Ended

Explain what a data breach is and provide an example of how it can occur.

media

Show answer

Auto Play

Slide 1 / 22

SLIDE