WIX3003 Technical Security Management

WIX3003 Technical Security Management

5th Grade

20 Qs

quiz-placeholder

Similar activities

UJIAN HARIAN TECHNOPARK

UJIAN HARIAN TECHNOPARK

1st - 12th Grade

20 Qs

Introduction to Web Design

Introduction to Web Design

5th Grade

20 Qs

Unit 6 - The Bigger Picture

Unit 6 - The Bigger Picture

1st - 10th Grade

23 Qs

HTML basics

HTML basics

5th - 10th Grade

20 Qs

Computer Hardware -  Input&Output Devices for Situations

Computer Hardware - Input&Output Devices for Situations

1st - 12th Grade

20 Qs

Coding Pre-Assessment

Coding Pre-Assessment

5th - 8th Grade

15 Qs

Rolurile_SGBD

Rolurile_SGBD

1st Grade - University

18 Qs

Dreamweaver HTML Basic

Dreamweaver HTML Basic

5th - 9th Grade

15 Qs

WIX3003 Technical Security Management

WIX3003 Technical Security Management

Assessment

Quiz

Computers

5th Grade

Medium

Created by

Muhammad Z'aba

Used 11+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

0 sec • 1 pt

Which of the following are examples of technical security controls?

intrusion detection system

encryption policy

encryption

security lighting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Countermeasures used to avoid security risks are a preventive type of security control

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Countermeasures used to detect security risks are a detective type of security control

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Countermeasures used to counteract security risks are a corrective type of security control

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Updating Windows to the latest security updates is an example of a corrective type of security control

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to NIST SP800-83, malware is a program that is overtly inserted into another program

Of course my dear

Wrong!

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A backdoor that is present in a computer may allow an attacker to install keylogger programs

Yes, probably

This is fake news!!

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?