Cybersecurity II - Semester Exam Review by Mr. Benvenuto

Cybersecurity II - Semester Exam Review by Mr. Benvenuto

12th Grade

31 Qs

quiz-placeholder

Similar activities

GDPR, Computer Misuse and Copyright Laws

GDPR, Computer Misuse and Copyright Laws

11th - 12th Grade

26 Qs

Warstwa łącza danych i sieciowa

Warstwa łącza danych i sieciowa

12th Grade

26 Qs

Assessment Term 2.2 - Y9 U4 Python Search algorithms

Assessment Term 2.2 - Y9 U4 Python Search algorithms

7th - 12th Grade

30 Qs

Karnaugh Map k-map

Karnaugh Map k-map

12th Grade

28 Qs

Unit 2 Pre-release (PhWSSE - January 2021) - Long Version

Unit 2 Pre-release (PhWSSE - January 2021) - Long Version

12th Grade

29 Qs

Computer Hardware

Computer Hardware

11th - 12th Grade

28 Qs

english

english

KG - Professional Development

28 Qs

SPM 2015

SPM 2015

7th Grade - University

34 Qs

Cybersecurity II - Semester Exam Review by Mr. Benvenuto

Cybersecurity II - Semester Exam Review by Mr. Benvenuto

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Cyber Professor - Mr. B

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

Media Image

Anny recently implemented an intrusion prevention system designed to block common network attacks from affecting his organization. What type of risk management strategy is Anny pursuing?

Risk Acceptance

Risk Avoidance

Risk Mitigation

Risk Transference

2.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

Media Image

Which of the following principles expects an individual to behave reasonably under any given circumstance?

Due Diligence

Separation of Duties

Due Care

Least Privilege

3.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

Media Image

What type of malware is characterized by spreading from system to system under its own power by exploiting vulnerabilities that do not require user intervention?

Trojan Horse

Virus

Logic Bomb

Worm

4.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

Media Image

Which one of the following security programs are designed to establish a minimum standard common denominator of security understanding?

Training

Education

Indoctrination

Awareness

5.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

Which one of the following is an example of physical infrastructure hardening?

Antivirus Software

Hardware-based Network Firewall

Two Factor-Authentication

Fire Suppression System

6.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

Media Image

Which information security goal is impacted when an organization experiences a DoS or DDoS attack?

Confidentiality

Integrity

Availability

Denial

7.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

Media Image

What is the best way to provide accountability for the use of identities?

Logging

Authorization

Digital Signatures

Digital Signatures

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?