ICT 3 INFORMATION ASSURANCE AND SECURITY

ICT 3 INFORMATION ASSURANCE AND SECURITY

University

10 Qs

quiz-placeholder

Similar activities

Principles of IT Vocabulary A-J

Principles of IT Vocabulary A-J

7th Grade - University

10 Qs

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

University

10 Qs

Topic 4 - Understanding System Vulnerabilities

Topic 4 - Understanding System Vulnerabilities

12th Grade - University

15 Qs

APi Security webinar

APi Security webinar

University

10 Qs

Five pillar of information security

Five pillar of information security

University

15 Qs

CN3303 - Lecture 9: Cloud Security threats

CN3303 - Lecture 9: Cloud Security threats

University

10 Qs

Unit 3 - 4.1.2 Wireless Devices

Unit 3 - 4.1.2 Wireless Devices

9th Grade - University

10 Qs

Unit 3 - 4.5.1 Endpoint Protocol and Email Security

Unit 3 - 4.5.1 Endpoint Protocol and Email Security

9th Grade - University

9 Qs

ICT 3 INFORMATION ASSURANCE AND SECURITY

ICT 3 INFORMATION ASSURANCE AND SECURITY

Assessment

Quiz

Computers

University

Easy

Created by

Xanon Adovas

Used 44+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

IDENTIFY WHAT ARE THESE THINGS

MALWARE, SOCIAL ENGINEERING, INSIDER THREATS, NETWORK BASE ATTACKS. PHYSICAL THREATS

ACCESS CONTROLS

ENCRYPTION

TYPES OF THREATS

SECURITY ACCESS

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

IT IS THE DIVISION OF NETWORKS INTO A SMALLER PARTS TO MAKE IT MORE SECURE

NETWORK ANALYTICS

DATA REFERENCE

DATA STRUCTURE

NETWORK SEGMENTATION

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When something happens to a company in case of data breach, this things should be follow and observe

Incident response plan

Security Plan

Data Breach Plan

Access Control Plan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As a security specialist, this type of app can help you or assist you in taking control from malware and other similar malicious files

Firewalls

Antivirus

Encryption

Digital Certificate

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TSUBASA WORKS IN AN IT COMPANY, AND HOLDING 1 OF THE 2 KEY FOR ACCESS, FOR DECRYPTING AND ENCRYPTING. WHAT KIND OF ENCRYPTION IS THIS

ASSYMETRIC ENCRYPTION

SYMMETRIC ENCRYPTION

ACCESS ENCRYPTION

NUMBER 3 ENCRYPTION

6.

FILL IN THE BLANK QUESTION

20 sec • 1 pt

This danger can harm tangible assets, what is it?

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

This type of attack takes control to a large number of computers and use it for his own attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?