INFOSEC WEEK DAY 3

INFOSEC WEEK DAY 3

Professional Development

10 Qs

quiz-placeholder

Similar activities

OER Lesson 2

OER Lesson 2

Professional Development

10 Qs

INFOSEC WEEK DAY 2

INFOSEC WEEK DAY 2

Professional Development

10 Qs

PPI DIGITAL QUIZ 1

PPI DIGITAL QUIZ 1

Professional Development

10 Qs

Career Quiz

Career Quiz

Professional Development

14 Qs

Day 4 Quiz

Day 4 Quiz

Professional Development

10 Qs

PRE- TEST

PRE- TEST

Professional Development

10 Qs

DMK_U6

DMK_U6

Professional Development

9 Qs

Cybersecurity Quiz for Associates

Cybersecurity Quiz for Associates

Professional Development

15 Qs

INFOSEC WEEK DAY 3

INFOSEC WEEK DAY 3

Assessment

Quiz

Other

Professional Development

Medium

Used 19+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Most information security breaches occur due to what?

Expert External Hackers

Poor Programming Techniques

Negligent Employees

Bad Firewall Settings

None of the above

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

In Information Security, ……………………., means that computer system assets/data can be accessed only by authorized parities.

Confidentiality

Integrity

Availability

Authenticity

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When do we classify an event as an incident?

Frequent attacks directed against information assets

The attacks that have a higher chance of success

Events that threaten confidentiality, integrity, or availability of information resources

Any event that occurs more than the three times and affects the positivity level of the information system

4.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which two strategies will help protect hardcopy information? (Choose two.)

Shred printouts before disposal

Encrypt all files

Sign all documents

Adopt a "clean desk" policy

Store files in encrypted folder

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Generally, who are hackers?

a) They are benign computer experts.

b) They are malicious computer criminals.

c) Individuals who are proficient with the use of computer resources

A and B above

A, B & C above

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When you travel for work you often need to use open Wi-Fi networks, e.g. at the airport

However, you are aware that there might be dangers with such open networks…. Which of these activities has the highest risk on using on a public wifi

Browse through NairaBet.com

Log into your gtbank email account through Office365 online to send an email

Login to GTBank Internet banking to perform transactions

Checking your instagram updates

None of the above

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The other day you were watching the news and you heard a journalist talking about a new type of cyber-threat.

Essentially criminals seem to be able to use malicious software to restrict users from accessing their computer system or personal files. Later criminals demand a payment in order for the restriction to be removed.


What is the name of this new emerging threat?

Ransomware

CryptoLocker

Botnet

BitDefender

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?