
ICT 3 INFORMATION ASSURANCE AND SECURITY
Authored by Xanon Adovas
Computers
University
Used 44+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
IDENTIFY WHAT ARE THESE THINGS
MALWARE, SOCIAL ENGINEERING, INSIDER THREATS, NETWORK BASE ATTACKS. PHYSICAL THREATS
ACCESS CONTROLS
ENCRYPTION
TYPES OF THREATS
SECURITY ACCESS
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
IT IS THE DIVISION OF NETWORKS INTO A SMALLER PARTS TO MAKE IT MORE SECURE
NETWORK ANALYTICS
DATA REFERENCE
DATA STRUCTURE
NETWORK SEGMENTATION
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When something happens to a company in case of data breach, this things should be follow and observe
Incident response plan
Security Plan
Data Breach Plan
Access Control Plan
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
As a security specialist, this type of app can help you or assist you in taking control from malware and other similar malicious files
Firewalls
Antivirus
Encryption
Digital Certificate
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
TSUBASA WORKS IN AN IT COMPANY, AND HOLDING 1 OF THE 2 KEY FOR ACCESS, FOR DECRYPTING AND ENCRYPTING. WHAT KIND OF ENCRYPTION IS THIS
ASSYMETRIC ENCRYPTION
SYMMETRIC ENCRYPTION
ACCESS ENCRYPTION
NUMBER 3 ENCRYPTION
6.
FILL IN THE BLANK QUESTION
20 sec • 1 pt
This danger can harm tangible assets, what is it?
(a)
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
This type of attack takes control to a large number of computers and use it for his own attack
(a)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?