Search Header Logo

Cyber Security Actions

Authored by nurul faizzen

Other

Professional Development

Used 5+ times

Cyber Security Actions
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • Ungraded

Which house are you from?

Hufflepuff

Slytherin

Gryffindor

Ravenclaw

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Below are the components of Identity and Access Management except?

Single Sign-On (SSO)

Multi-Factor Authentication (MFA)

Identity Governance and Accessibility (IGA)

Identity Governance and Administration (IGA)

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which are the applications of used in PETRONAS?

Single Sign-On & IGA

Single Sign-On & MFA

MFA & IGA

Single Sign-On, MFA and IGA

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Identity and Governance Administration (IGA) system’s _____________ feature ensures that permissions are reviewed and updated regularly. Managers will get reminders to attest that users still have valid business reasons to access particular systems.

User Access Attestation

User Control Attestation

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_______________ is a tools which protects company data on mobile devices without infringing into personal data.

Mobile Data Management

Mobile Data Administration

Mobile Device Administration

Mobile Device Management

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Below are the common feature of MFA used in our daily transactions:

i. Using a credit/debit card at an ATM or at a checkout counter, and entering a PIN

ii. Using your password to login, and then entering an OTP sent to your phone or email address

iii. Scanning MySejahtera apps prior entering any premises

iv. Validation of your identity at a government office by inserting your Identity Card and scanning a fingerprint

i and ii

i, ii and iii

i, ii and iv

ii and iii

7.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

A strong password is a critical line of defense in preventing a cyberattack. Which are the criteria of new password policy:

Contains at least 14 characters

Reuse old passwords or add on to existing passwords

Contains at least 3 of the 4: Uppercase, Lowercase, Number, Symbol

Does not contain the words ‘PETRONAS’ in any form

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?