Most information security breaches occur due to what?
INFOSEC WEEK DAY 3

Quiz
•
Other
•
Professional Development
•
Medium
Used 19+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Expert External Hackers
Poor Programming Techniques
Negligent Employees
Bad Firewall Settings
None of the above
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
In Information Security, ……………………., means that computer system assets/data can be accessed only by authorized parities.
Confidentiality
Integrity
Availability
Authenticity
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
When do we classify an event as an incident?
Frequent attacks directed against information assets
The attacks that have a higher chance of success
Events that threaten confidentiality, integrity, or availability of information resources
Any event that occurs more than the three times and affects the positivity level of the information system
4.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Which two strategies will help protect hardcopy information? (Choose two.)
Shred printouts before disposal
Encrypt all files
Sign all documents
Adopt a "clean desk" policy
Store files in encrypted folder
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Generally, who are hackers?
a) They are benign computer experts.
b) They are malicious computer criminals.
c) Individuals who are proficient with the use of computer resources
A and B above
A, B & C above
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
When you travel for work you often need to use open Wi-Fi networks, e.g. at the airport
However, you are aware that there might be dangers with such open networks…. Which of these activities has the highest risk on using on a public wifi
Browse through NairaBet.com
Log into your gtbank email account through Office365 online to send an email
Login to GTBank Internet banking to perform transactions
Checking your instagram updates
None of the above
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The other day you were watching the news and you heard a journalist talking about a new type of cyber-threat.
Essentially criminals seem to be able to use malicious software to restrict users from accessing their computer system or personal files. Later criminals demand a payment in order for the restriction to be removed.
What is the name of this new emerging threat?
Ransomware
CryptoLocker
Botnet
BitDefender
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Computerised Accounting

Quiz
•
Professional Development
10 questions
lesson 5

Quiz
•
Professional Development
10 questions
Business Analytics

Quiz
•
Professional Development
13 questions
DMK_U1

Quiz
•
Professional Development
15 questions
Cybersecurity Awareness Quiz

Quiz
•
Professional Development
9 questions
IEEE Standards

Quiz
•
Professional Development
12 questions
21ST CENTURY SKILLS

Quiz
•
Professional Development
15 questions
Super Duper Policy Refresher

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade