ICT 3 INFORMATION ASSURANCE AND SECURITY

ICT 3 INFORMATION ASSURANCE AND SECURITY

University

10 Qs

quiz-placeholder

Similar activities

ECM3434 Business Analysis 1 - Business process modelling

ECM3434 Business Analysis 1 - Business process modelling

University

10 Qs

Unit 28 - Quiz #1

Unit 28 - Quiz #1

University

15 Qs

Quiz on Basics of C

Quiz on Basics of C

University

10 Qs

PYTHON_CHAPTER 6

PYTHON_CHAPTER 6

University

10 Qs

INTRODUCTION TO CODING QUIZ 2

INTRODUCTION TO CODING QUIZ 2

University

13 Qs

nestedif _ And _ Or

nestedif _ And _ Or

University

10 Qs

DBMS LAB QUIZ

DBMS LAB QUIZ

University

15 Qs

GODOT ENGINE

GODOT ENGINE

University

10 Qs

ICT 3 INFORMATION ASSURANCE AND SECURITY

ICT 3 INFORMATION ASSURANCE AND SECURITY

Assessment

Quiz

Computers

University

Easy

Created by

Xanon Adovas

Used 44+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

IDENTIFY WHAT ARE THESE THINGS

MALWARE, SOCIAL ENGINEERING, INSIDER THREATS, NETWORK BASE ATTACKS. PHYSICAL THREATS

ACCESS CONTROLS

ENCRYPTION

TYPES OF THREATS

SECURITY ACCESS

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

IT IS THE DIVISION OF NETWORKS INTO A SMALLER PARTS TO MAKE IT MORE SECURE

NETWORK ANALYTICS

DATA REFERENCE

DATA STRUCTURE

NETWORK SEGMENTATION

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When something happens to a company in case of data breach, this things should be follow and observe

Incident response plan

Security Plan

Data Breach Plan

Access Control Plan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As a security specialist, this type of app can help you or assist you in taking control from malware and other similar malicious files

Firewalls

Antivirus

Encryption

Digital Certificate

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TSUBASA WORKS IN AN IT COMPANY, AND HOLDING 1 OF THE 2 KEY FOR ACCESS, FOR DECRYPTING AND ENCRYPTING. WHAT KIND OF ENCRYPTION IS THIS

ASSYMETRIC ENCRYPTION

SYMMETRIC ENCRYPTION

ACCESS ENCRYPTION

NUMBER 3 ENCRYPTION

6.

FILL IN THE BLANK QUESTION

20 sec • 1 pt

This danger can harm tangible assets, what is it?

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

This type of attack takes control to a large number of computers and use it for his own attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?