Cyber Security Plan

Cyber Security Plan

12th Grade

12 Qs

quiz-placeholder

Similar activities

Chapter 2: Input Device

Chapter 2: Input Device

12th Grade - University

12 Qs

TRẮC NGHIỆM TIN 12 KỲ II

TRẮC NGHIỆM TIN 12 KỲ II

10th - 12th Grade

10 Qs

Bài làm việc Access, cấu trúc bảng

Bài làm việc Access, cấu trúc bảng

9th - 12th Grade

10 Qs

User Interface Design - Topic 1

User Interface Design - Topic 1

12th Grade

15 Qs

3rd week g9 summative

3rd week g9 summative

7th - 12th Grade

15 Qs

Recap

Recap

12th Grade

10 Qs

Computer Basics 2 - CESA

Computer Basics 2 - CESA

7th Grade - University

10 Qs

animal crossing quiz

animal crossing quiz

1st - 12th Grade

10 Qs

Cyber Security Plan

Cyber Security Plan

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Paul Jenkins

Used 46+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are sections of a cyber security plan?

Threat(s) addressed by the protection measure

Justification of technical responsibilities

Outline cost-benefit

Overview of usability constraints

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following might hardware firewalls be used for?

Detecting malware that has infected a computer.

Scanning ports to see what are open for data to pass through.

Filtering website to prevent accidentally infecting a computer from a web page with malicious code.

Packet filtering to prevent Denial of Service attacks.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

If an organisation uses mobile devices, how might they secure these devices from theft?

Hardware Firewall

Locked Cabinets

Alarm System

Access Rights

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Port scanning can detect open ports that might be a vulnerability in the system.

True

False

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are good techniques for mitigating the level of impact should a malicious user gain access to data?

Access Rights

Network Segmentation

Anti-Malware

Wireless Access Points

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All threats must be protected against, even if they are identified as being low risk.

True

False

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are examples of technical or financial constraints?

Specialist skills needed to perform tasks.

The hardware and software available.

The legislation that must be adhered to.

The performance of the system.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers