Unit 11 C3 - A Cyber Security Plan for a System

Unit 11 C3 - A Cyber Security Plan for a System

12th Grade

10 Qs

quiz-placeholder

Similar activities

Ujian semesterganjil

Ujian semesterganjil

8th Grade - University

15 Qs

Teknologi Informasi - UMKM

Teknologi Informasi - UMKM

12th Grade

15 Qs

issues with computers BTEC IT learning aim F

issues with computers BTEC IT learning aim F

12th Grade

10 Qs

Information Management

Information Management

12th Grade

10 Qs

Technical Terms - Internet (A-Z) - Internet

Technical Terms - Internet (A-Z) - Internet

12th Grade

10 Qs

Hardware and Software

Hardware and Software

12th Grade

10 Qs

Digital Threats

Digital Threats

9th - 12th Grade

10 Qs

cyber safety

cyber safety

9th - 12th Grade

15 Qs

Unit 11 C3 - A Cyber Security Plan for a System

Unit 11 C3 - A Cyber Security Plan for a System

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Ralph Ellis

Used 22+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are examples of the information required for each protection measure?

Threat(s) addressed by the protection measure

Action(s) to be taken

Reasons for the action(s)

Overview of technical and financial constraints

Overview of legal responsibilities

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Firewalls, routers and wireless access points can be used to support which type of protection method?

Hardware

Software

Physical

Mental

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Firewalls, anti-malware, port scanning and access rights can be used to support which type of protection method?

Hardware

Software

Physical

Mental

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Locks, CCTV, alarm systems and back-ups can be used to support which type of protection method?

Hardware

Software

Physical

Mental

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Used for risks that may be too costly to deal with based on its supposed impact that it is believed to have.

Often threats classified as “Low” risk may be left in this way.

Risk acceptance

Risk avoidance

Risk transfer

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Potential technical and financial constraints might include which of the following?

Difficulties in any technical tasks

Limitations in available hardware or software required

Requirements of staff to perform certain protection measures

Computer Misuse Act

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Potential Cyber Plan action items for network security

Develop strong password policies

Secure and encrypt your company’s Wi-Fi

Set up a spam email filter

Dispose of rubbish securely

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?