Cyber Security Plan

Cyber Security Plan

12th Grade

12 Qs

quiz-placeholder

Similar activities

cyber safety

cyber safety

9th - 12th Grade

15 Qs

How safe is your information?

How safe is your information?

5th - 12th Grade

10 Qs

5.4 Excel Quizizz

5.4 Excel Quizizz

8th - 12th Grade

15 Qs

PITA Unit 6 Quiz Review

PITA Unit 6 Quiz Review

9th - 12th Grade

9 Qs

G11 Malware - Protection

G11 Malware - Protection

12th Grade

15 Qs

30. Ethical_Legal_Enviro CS Legislation Quiz

30. Ethical_Legal_Enviro CS Legislation Quiz

9th - 12th Grade

11 Qs

HTML

HTML

9th - 12th Grade

15 Qs

Jan 2020 Unit 2 Case Study 2

Jan 2020 Unit 2 Case Study 2

12th Grade

15 Qs

Cyber Security Plan

Cyber Security Plan

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Paul Jenkins

Used 46+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are sections of a cyber security plan?

Threat(s) addressed by the protection measure

Justification of technical responsibilities

Outline cost-benefit

Overview of usability constraints

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following might hardware firewalls be used for?

Detecting malware that has infected a computer.

Scanning ports to see what are open for data to pass through.

Filtering website to prevent accidentally infecting a computer from a web page with malicious code.

Packet filtering to prevent Denial of Service attacks.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

If an organisation uses mobile devices, how might they secure these devices from theft?

Hardware Firewall

Locked Cabinets

Alarm System

Access Rights

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Port scanning can detect open ports that might be a vulnerability in the system.

True

False

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are good techniques for mitigating the level of impact should a malicious user gain access to data?

Access Rights

Network Segmentation

Anti-Malware

Wireless Access Points

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All threats must be protected against, even if they are identified as being low risk.

True

False

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are examples of technical or financial constraints?

Specialist skills needed to perform tasks.

The hardware and software available.

The legislation that must be adhered to.

The performance of the system.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?