Cyber Security Fundamental - RK

Cyber Security Fundamental - RK

Professional Development

10 Qs

quiz-placeholder

Similar activities

SLS PS 2.0 Types of Learning Experiences (LE)

SLS PS 2.0 Types of Learning Experiences (LE)

Professional Development

10 Qs

Pivot Tables

Pivot Tables

Professional Development

10 Qs

Design Basics of Substation  engineering

Design Basics of Substation engineering

Professional Development

10 Qs

Soal PPPK Pedagogik 4

Soal PPPK Pedagogik 4

Professional Development

15 Qs

Trg@home 1

Trg@home 1

Professional Development

10 Qs

Pre and Post Test

Pre and Post Test

Professional Development

10 Qs

Pre & Post Test QCC

Pre & Post Test QCC

Professional Development

10 Qs

Microsoft 365

Microsoft 365

Professional Development

11 Qs

Cyber Security Fundamental - RK

Cyber Security Fundamental - RK

Assessment

Quiz

Professional Development

Professional Development

Practice Problem

Hard

Created by

Rittichai Koo

Used 30+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The new age cyber criminals have already paved their way to attack _______?

Personal Devices

Servers

IoT Devices

Computers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is most likely to be "Cyber Security"?

The practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.

The design that deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm.

The protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities

A set of policies, controls, procedures and technologies that work together to protect cloud-based systems, data, and infrastructure.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information?

Information technology security

Physical security

Cyber security

Information security

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In view of cyber threat, which one is the highest mitigation cost?

Hacker Hobbyist

State Sponsored Attacks

Cyber Terrorist

Third Party Provider

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the People-Process-Technology triad, the weakest link is ________?

People

Process

Technology

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Asset management is a part of ________ in Cyber Resilience?

Response

Protect

Recover

Identify

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is the key emerging cyber security risks as a result of COVID-19?

Disruption to the workforce and global supply chains.

Change in the cyber security risk landscape post COVID-19

A shift to remote working and prioritising business operations.

All above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?