WIX3003 Technical Security Management

WIX3003 Technical Security Management

5th Grade

20 Qs

quiz-placeholder

Similar activities

Makecode Intro.

Makecode Intro.

5th - 7th Grade

15 Qs

Cascade Troubleshooting

Cascade Troubleshooting

1st - 5th Grade

18 Qs

Healthy Practices

Healthy Practices

5th Grade

15 Qs

Design thinking JC

Design thinking JC

4th - 6th Grade

20 Qs

P5 Online Video Conference

P5 Online Video Conference

5th - 6th Grade

20 Qs

Quiz Model Prototype

Quiz Model Prototype

1st - 7th Grade

15 Qs

Class 6 TCS Analysing data

Class 6 TCS Analysing data

5th - 7th Grade

20 Qs

Systems Architecture

Systems Architecture

KG - 9th Grade

15 Qs

WIX3003 Technical Security Management

WIX3003 Technical Security Management

Assessment

Quiz

Computers

5th Grade

Practice Problem

Medium

Created by

Muhammad Z'aba

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

0 sec • 1 pt

Which of the following are examples of technical security controls?

intrusion detection system

encryption policy

encryption

security lighting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Countermeasures used to avoid security risks are a preventive type of security control

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Countermeasures used to detect security risks are a detective type of security control

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Countermeasures used to counteract security risks are a corrective type of security control

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Updating Windows to the latest security updates is an example of a corrective type of security control

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to NIST SP800-83, malware is a program that is overtly inserted into another program

Of course my dear

Wrong!

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A backdoor that is present in a computer may allow an attacker to install keylogger programs

Yes, probably

This is fake news!!

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?