INFOASSURANCE

INFOASSURANCE

University

10 Qs

quiz-placeholder

Similar activities

Domain 6 Quiz

Domain 6 Quiz

University

12 Qs

DISTRIED TECHNOLBUTOGIES

DISTRIED TECHNOLBUTOGIES

University

15 Qs

Cybersecurity

Cybersecurity

University

11 Qs

Data Security Quiz

Data Security Quiz

University

11 Qs

Git and Github

Git and Github

University

15 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Networking Vocab

Networking Vocab

KG - University

10 Qs

ASI 3

ASI 3

University

14 Qs

INFOASSURANCE

INFOASSURANCE

Assessment

Quiz

Computers

University

Medium

Created by

Rexiecats Rexiecats

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 4 pts

This layer of cybersecurity ensures that _______ have strategies in place to proactively prevent and to respond quickly and effectively in the event of a cybersecurity incident

2.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

are a type of malware that, once activated, grants hackers control over the infected computer. The attacker can then proceed with stealing data from the machine, rendering it inoperable, and using the camera

remote administrative tools

remote administration tools

remote administrating tools

remote malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

Hackers proceed to hiding their _____ to mask the origins of the attack.

pants

shorts

tracks

track

4.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

Employees can ​create some of the _____ _____ to cybersecurity.

most threat

greatest risks

reduced

least risks

increase

5.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

Deep learning encompasses some technologies like machine learning and __________.

Deep web

Robotics

Information Technology

Artificial Intelligence

6.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

Hardware authentication is a well-known fact that a majority of data users’ passwords and usernames are weak.

False

True

Not sure

No correct answer

7.

FILL IN THE BLANK QUESTION

30 sec • 4 pts

A ______ is a set of rules that appliesto activities for the computer and communications resources that belong to an organization.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?