Introduction to Cybersecurity

Introduction to Cybersecurity

Professional Development

20 Qs

quiz-placeholder

Similar activities

IBM Course 2-Excel Basics

IBM Course 2-Excel Basics

Professional Development

18 Qs

KUIZ PROMINO

KUIZ PROMINO

Professional Development

20 Qs

Nintendo Wii

Nintendo Wii

3rd Grade - Professional Development

20 Qs

Microsoft Excel

Microsoft Excel

KG - Professional Development

20 Qs

Datatypes and Flowcontrol

Datatypes and Flowcontrol

Professional Development

15 Qs

Salesforce Developer

Salesforce Developer

Professional Development

20 Qs

Brands

Brands

1st Grade - Professional Development

15 Qs

Revision Test

Revision Test

Professional Development

20 Qs

Introduction to Cybersecurity

Introduction to Cybersecurity

Assessment

Quiz

Computers, Special Education, Life Skills

Professional Development

Hard

Created by

Shadab Sheikh

Used 45+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Anny recently implemented an intrusion prevention system designed to block common network attacks from affecting his organization. What type of risk management strategy is Anny pursuing?

Risk Acceptance

Risk Avoidance

Risk Mitigation

Risk Transference

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following principles expects an individual to behave reasonably under any given circumstance?

Due Diligence

Separation of Duties

Due Care

Least Privilege

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of malware is characterized by spreading from system to system under its own power by exploiting vulnerabilities that do not require user intervention?

Trojan Horse

Virus

Logic Bomb

Worm

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following security programs is designed to establish a minimum standard common denominator of security understanding?

Training

Education

Indoctrination

Awareness

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is an example of physical infrastructure hardening?

Antivirus Software

Hardware-based Network Firewall

Two Factor-Authentication

Fire Suppression System

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which information security goal is impacted when an organization experiences a DoS or DDoS attack?

Confidentiality

Integrity

Availability

Denial

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the best way to provide accountability for the use of identities?

Logging

Authorization

Digital Signatures

Type 1 Authentication

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?