Cybersecurity MidTerm Exam

Cybersecurity MidTerm Exam

9th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

Network types

Network types

9th Grade

23 Qs

A2-T15-Virtual Machine

A2-T15-Virtual Machine

10th - 12th Grade

20 Qs

CySa+ PT5: 2 of 3

CySa+ PT5: 2 of 3

9th Grade - Professional Development

20 Qs

ICT 9 Q4 M1 & 2

ICT 9 Q4 M1 & 2

9th Grade - University

20 Qs

Code Unit 2 The Internet 2020-21

Code Unit 2 The Internet 2020-21

9th - 12th Grade

20 Qs

computer organization fundamentals

computer organization fundamentals

9th - 10th Grade

20 Qs

Chapter 6 Review

Chapter 6 Review

9th - 12th Grade

20 Qs

Intro to CyberSecurity - Intro to Networking

Intro to CyberSecurity - Intro to Networking

9th - 12th Grade

25 Qs

Cybersecurity MidTerm Exam

Cybersecurity MidTerm Exam

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Easy

Created by

Terry Anderson

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who has the greastest influence over access security in a password authentication environment?

Wrong

Users

Wrong

Wrong

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following interpret requirements and apply them to specific situations?

Wrong

Wrong

Standard

Wrong

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of:

Business needs

Wrong

Wrong

Wrong

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A segmented network:

Wrong

Consists of two or more security zones

Wrong

Wrong

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cybersecurity principle is most important when attempting to trace the source of malicious activity?

Wrong

Wrong

Wrong

Nonrepudiation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following offers the strongest protection for wireless network traffic?

Wireless Protected Access 2 (WPA2)

Wrong

Wrong

Wrong

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Outsourcing poses the greatest risk to an organization when it involves:

Wrong

Wrong

Core business functions

Wrong

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?