Cyber Security Fundamental - RK

Cyber Security Fundamental - RK

Professional Development

10 Qs

quiz-placeholder

Similar activities

M4Q4

M4Q4

Professional Development

10 Qs

E-safety-post session

E-safety-post session

Professional Development

6 Qs

ADMS TNB

ADMS TNB

Professional Development

12 Qs

Kuiz Webinar Bicara Etika Siber

Kuiz Webinar Bicara Etika Siber

Professional Development

10 Qs

Design Secure Network

Design Secure Network

Professional Development

10 Qs

Cybersecurity Vigilance: Strengthening Your Organization

Cybersecurity Vigilance: Strengthening Your Organization

Professional Development

10 Qs

BBS: Friday@4pm with Norasyikin Mohamad Rafiai

BBS: Friday@4pm with Norasyikin Mohamad Rafiai

Professional Development

7 Qs

CSIRP Training

CSIRP Training

Professional Development

10 Qs

Cyber Security Fundamental - RK

Cyber Security Fundamental - RK

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

Rittichai Koo

Used 30+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The new age cyber criminals have already paved their way to attack _______?

Personal Devices

Servers

IoT Devices

Computers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is most likely to be "Cyber Security"?

The practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.

The design that deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm.

The protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities

A set of policies, controls, procedures and technologies that work together to protect cloud-based systems, data, and infrastructure.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information?

Information technology security

Physical security

Cyber security

Information security

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In view of cyber threat, which one is the highest mitigation cost?

Hacker Hobbyist

State Sponsored Attacks

Cyber Terrorist

Third Party Provider

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the People-Process-Technology triad, the weakest link is ________?

People

Process

Technology

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Asset management is a part of ________ in Cyber Resilience?

Response

Protect

Recover

Identify

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is the key emerging cyber security risks as a result of COVID-19?

Disruption to the workforce and global supply chains.

Change in the cyber security risk landscape post COVID-19

A shift to remote working and prioritising business operations.

All above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?