Unit 11 C3 - A Cyber Security Plan for a System

Unit 11 C3 - A Cyber Security Plan for a System

12th Grade

10 Qs

quiz-placeholder

Similar activities

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Technical Terms - Internet (A-Z) - Martech

Technical Terms - Internet (A-Z) - Martech

12th Grade

10 Qs

Computers

Computers

KG - University

12 Qs

Computers Check for Understanding

Computers Check for Understanding

8th - 12th Grade

10 Qs

Software Installation

Software Installation

12th Grade

14 Qs

Q & A 1

Q & A 1

12th Grade

10 Qs

Cyber Security Plan

Cyber Security Plan

12th Grade

12 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

Unit 11 C3 - A Cyber Security Plan for a System

Unit 11 C3 - A Cyber Security Plan for a System

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Ralph Ellis

Used 22+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are examples of the information required for each protection measure?

Threat(s) addressed by the protection measure

Action(s) to be taken

Reasons for the action(s)

Overview of technical and financial constraints

Overview of legal responsibilities

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Firewalls, routers and wireless access points can be used to support which type of protection method?

Hardware

Software

Physical

Mental

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Firewalls, anti-malware, port scanning and access rights can be used to support which type of protection method?

Hardware

Software

Physical

Mental

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Locks, CCTV, alarm systems and back-ups can be used to support which type of protection method?

Hardware

Software

Physical

Mental

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Used for risks that may be too costly to deal with based on its supposed impact that it is believed to have.

Often threats classified as “Low” risk may be left in this way.

Risk acceptance

Risk avoidance

Risk transfer

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Potential technical and financial constraints might include which of the following?

Difficulties in any technical tasks

Limitations in available hardware or software required

Requirements of staff to perform certain protection measures

Computer Misuse Act

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Potential Cyber Plan action items for network security

Develop strong password policies

Secure and encrypt your company’s Wi-Fi

Set up a spam email filter

Dispose of rubbish securely

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?