
Cybersecurity MidTerm Exam
Authored by Terry Anderson
Instructional Technology
9th - 12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Who has the greastest influence over access security in a password authentication environment?
Wrong
Users
Wrong
Wrong
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following interpret requirements and apply them to specific situations?
Wrong
Wrong
Standard
Wrong
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of:
Business needs
Wrong
Wrong
Wrong
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A segmented network:
Wrong
Consists of two or more security zones
Wrong
Wrong
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which cybersecurity principle is most important when attempting to trace the source of malicious activity?
Wrong
Wrong
Wrong
Nonrepudiation
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following offers the strongest protection for wireless network traffic?
Wireless Protected Access 2 (WPA2)
Wrong
Wrong
Wrong
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Outsourcing poses the greatest risk to an organization when it involves:
Wrong
Wrong
Core business functions
Wrong
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?