Cybersecurity MidTerm Exam

Cybersecurity MidTerm Exam

9th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

Intro to Digital Technology Review

Intro to Digital Technology Review

9th - 12th Grade

21 Qs

EMTECH Q1 REVIEW

EMTECH Q1 REVIEW

11th - 12th Grade

22 Qs

S2 CPA EOY Revision 1 (WSSS 2018)

S2 CPA EOY Revision 1 (WSSS 2018)

10th Grade

20 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

Domain 1 Network+ Review Questions

Domain 1 Network+ Review Questions

12th Grade

20 Qs

ICT 9 Q4 M1 & 2

ICT 9 Q4 M1 & 2

9th Grade - University

20 Qs

CompTIA Network+ v1.0 (N10-008) Quiz

CompTIA Network+ v1.0 (N10-008) Quiz

12th Grade

20 Qs

Network types

Network types

9th Grade

23 Qs

Cybersecurity MidTerm Exam

Cybersecurity MidTerm Exam

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Easy

Created by

Terry Anderson

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who has the greastest influence over access security in a password authentication environment?

Wrong

Users

Wrong

Wrong

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following interpret requirements and apply them to specific situations?

Wrong

Wrong

Standard

Wrong

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of:

Business needs

Wrong

Wrong

Wrong

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A segmented network:

Wrong

Consists of two or more security zones

Wrong

Wrong

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cybersecurity principle is most important when attempting to trace the source of malicious activity?

Wrong

Wrong

Wrong

Nonrepudiation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following offers the strongest protection for wireless network traffic?

Wireless Protected Access 2 (WPA2)

Wrong

Wrong

Wrong

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Outsourcing poses the greatest risk to an organization when it involves:

Wrong

Wrong

Core business functions

Wrong

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?