Cyber Security Plan

Cyber Security Plan

12th Grade

12 Qs

quiz-placeholder

Similar activities

Computing Laws

Computing Laws

12th Grade

16 Qs

Computer Ethics and Security

Computer Ethics and Security

9th - 12th Grade

10 Qs

CTEC IT Unit 2 LO4 Legislation

CTEC IT Unit 2 LO4 Legislation

12th Grade

13 Qs

MAIL MERGE

MAIL MERGE

11th - 12th Grade

10 Qs

Fundamentals of CS - Legal Considerations

Fundamentals of CS - Legal Considerations

3rd - 12th Grade

10 Qs

J277 - 1.6 - Technology and the Law

J277 - 1.6 - Technology and the Law

10th Grade - University

10 Qs

1.6 Legal Issues

1.6 Legal Issues

12th Grade

16 Qs

Computer Misuse Act

Computer Misuse Act

10th - 12th Grade

12 Qs

Cyber Security Plan

Cyber Security Plan

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Paul Jenkins

Used 46+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are sections of a cyber security plan?

Threat(s) addressed by the protection measure

Justification of technical responsibilities

Outline cost-benefit

Overview of usability constraints

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following might hardware firewalls be used for?

Detecting malware that has infected a computer.

Scanning ports to see what are open for data to pass through.

Filtering website to prevent accidentally infecting a computer from a web page with malicious code.

Packet filtering to prevent Denial of Service attacks.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

If an organisation uses mobile devices, how might they secure these devices from theft?

Hardware Firewall

Locked Cabinets

Alarm System

Access Rights

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Port scanning can detect open ports that might be a vulnerability in the system.

True

False

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are good techniques for mitigating the level of impact should a malicious user gain access to data?

Access Rights

Network Segmentation

Anti-Malware

Wireless Access Points

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All threats must be protected against, even if they are identified as being low risk.

True

False

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are examples of technical or financial constraints?

Specialist skills needed to perform tasks.

The hardware and software available.

The legislation that must be adhered to.

The performance of the system.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?