Introduction to Cybersecurity

Introduction to Cybersecurity

Professional Development

20 Qs

quiz-placeholder

Similar activities

Logika & Pemrograman (ID)

Logika & Pemrograman (ID)

10th Grade - Professional Development

20 Qs

Deaf Awareness/BSL

Deaf Awareness/BSL

5th Grade - Professional Development

20 Qs

Tout savoir sur Windows Quiz 2

Tout savoir sur Windows Quiz 2

Professional Development

20 Qs

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

The level 100 Illusion Riddles

The level 100 Illusion Riddles

University - Professional Development

16 Qs

Bhagavad Gita Contest Ch-4

Bhagavad Gita Contest Ch-4

5th Grade - Professional Development

20 Qs

Office 365 & Services

Office 365 & Services

Professional Development

20 Qs

JAVA - Arrays

JAVA - Arrays

University - Professional Development

15 Qs

Introduction to Cybersecurity

Introduction to Cybersecurity

Assessment

Quiz

Computers, Special Education, Life Skills

Professional Development

Practice Problem

Hard

Created by

Shadab Sheikh

Used 47+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Anny recently implemented an intrusion prevention system designed to block common network attacks from affecting his organization. What type of risk management strategy is Anny pursuing?

Risk Acceptance

Risk Avoidance

Risk Mitigation

Risk Transference

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following principles expects an individual to behave reasonably under any given circumstance?

Due Diligence

Separation of Duties

Due Care

Least Privilege

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of malware is characterized by spreading from system to system under its own power by exploiting vulnerabilities that do not require user intervention?

Trojan Horse

Virus

Logic Bomb

Worm

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following security programs is designed to establish a minimum standard common denominator of security understanding?

Training

Education

Indoctrination

Awareness

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is an example of physical infrastructure hardening?

Antivirus Software

Hardware-based Network Firewall

Two Factor-Authentication

Fire Suppression System

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which information security goal is impacted when an organization experiences a DoS or DDoS attack?

Confidentiality

Integrity

Availability

Denial

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the best way to provide accountability for the use of identities?

Logging

Authorization

Digital Signatures

Type 1 Authentication

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?