WIX3003 Technical Security Management

WIX3003 Technical Security Management

5th Grade

20 Qs

quiz-placeholder

Similar activities

U6_LibreOffice Calc_Revision_Quiz

U6_LibreOffice Calc_Revision_Quiz

5th Grade

18 Qs

Empowerment Technologies

Empowerment Technologies

KG - 12th Grade

15 Qs

Whiz Looks Back

Whiz Looks Back

1st - 6th Grade

16 Qs

Informática Aplicada Vectores C++

Informática Aplicada Vectores C++

5th Grade

20 Qs

Network safety

Network safety

KG - 6th Grade

20 Qs

Abolition and Women's Suffrage

Abolition and Women's Suffrage

1st Grade - University

20 Qs

Topic 3 (Stacks)

Topic 3 (Stacks)

1st - 12th Grade

20 Qs

Linux-2 Quiz 2 -- LAMP

Linux-2 Quiz 2 -- LAMP

1st - 12th Grade

15 Qs

WIX3003 Technical Security Management

WIX3003 Technical Security Management

Assessment

Quiz

Computers

5th Grade

Practice Problem

Medium

Created by

Muhammad Z'aba

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

0 sec • 1 pt

Which of the following are examples of technical security controls?

intrusion detection system

encryption policy

encryption

security lighting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Countermeasures used to avoid security risks are a preventive type of security control

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Countermeasures used to detect security risks are a detective type of security control

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Countermeasures used to counteract security risks are a corrective type of security control

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Updating Windows to the latest security updates is an example of a corrective type of security control

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to NIST SP800-83, malware is a program that is overtly inserted into another program

Of course my dear

Wrong!

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A backdoor that is present in a computer may allow an attacker to install keylogger programs

Yes, probably

This is fake news!!

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?