Search Header Logo

INFOSEC WEEK DAY 3

Other

Professional Development

Used 19+ times

INFOSEC WEEK DAY 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Most information security breaches occur due to what?

Expert External Hackers

Poor Programming Techniques

Negligent Employees

Bad Firewall Settings

None of the above

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

In Information Security, ……………………., means that computer system assets/data can be accessed only by authorized parities.

Confidentiality

Integrity

Availability

Authenticity

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When do we classify an event as an incident?

Frequent attacks directed against information assets

The attacks that have a higher chance of success

Events that threaten confidentiality, integrity, or availability of information resources

Any event that occurs more than the three times and affects the positivity level of the information system

4.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which two strategies will help protect hardcopy information? (Choose two.)

Shred printouts before disposal

Encrypt all files

Sign all documents

Adopt a "clean desk" policy

Store files in encrypted folder

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Generally, who are hackers?

a) They are benign computer experts.

b) They are malicious computer criminals.

c) Individuals who are proficient with the use of computer resources

A and B above

A, B & C above

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When you travel for work you often need to use open Wi-Fi networks, e.g. at the airport

However, you are aware that there might be dangers with such open networks…. Which of these activities has the highest risk on using on a public wifi

Browse through NairaBet.com

Log into your gtbank email account through Office365 online to send an email

Login to GTBank Internet banking to perform transactions

Checking your instagram updates

None of the above

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The other day you were watching the news and you heard a journalist talking about a new type of cyber-threat.

Essentially criminals seem to be able to use malicious software to restrict users from accessing their computer system or personal files. Later criminals demand a payment in order for the restriction to be removed.


What is the name of this new emerging threat?

Ransomware

CryptoLocker

Botnet

BitDefender

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?