Unit 11 C3 - A Cyber Security Plan for a System

Unit 11 C3 - A Cyber Security Plan for a System

12th Grade

10 Qs

quiz-placeholder

Similar activities

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Technical Terms - Internet (A-Z) - Martech

Technical Terms - Internet (A-Z) - Martech

12th Grade

10 Qs

Core Microsoft 365 Services and Concepts 2

Core Microsoft 365 Services and Concepts 2

12th Grade

10 Qs

Cyber Security Plan

Cyber Security Plan

12th Grade

12 Qs

Q & A 1

Q & A 1

12th Grade

10 Qs

J277 - 1.3 - Networks Basics

J277 - 1.3 - Networks Basics

9th Grade - University

15 Qs

Computer Misuse Act

Computer Misuse Act

10th - 12th Grade

12 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

Unit 11 C3 - A Cyber Security Plan for a System

Unit 11 C3 - A Cyber Security Plan for a System

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Ralph Ellis

Used 22+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are examples of the information required for each protection measure?

Threat(s) addressed by the protection measure

Action(s) to be taken

Reasons for the action(s)

Overview of technical and financial constraints

Overview of legal responsibilities

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Firewalls, routers and wireless access points can be used to support which type of protection method?

Hardware

Software

Physical

Mental

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Firewalls, anti-malware, port scanning and access rights can be used to support which type of protection method?

Hardware

Software

Physical

Mental

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Locks, CCTV, alarm systems and back-ups can be used to support which type of protection method?

Hardware

Software

Physical

Mental

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Used for risks that may be too costly to deal with based on its supposed impact that it is believed to have.

Often threats classified as “Low” risk may be left in this way.

Risk acceptance

Risk avoidance

Risk transfer

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Potential technical and financial constraints might include which of the following?

Difficulties in any technical tasks

Limitations in available hardware or software required

Requirements of staff to perform certain protection measures

Computer Misuse Act

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Potential Cyber Plan action items for network security

Develop strong password policies

Secure and encrypt your company’s Wi-Fi

Set up a spam email filter

Dispose of rubbish securely

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?