Search Header Logo

Cyber Mock

Authored by Michaela Flowers

Other

Professional Development

Used 1+ times

Cyber Mock
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt


Which of the following techniques is used to ensure confidentiality?

Encryption

Hashing

Encapsulation

Authentication

Answer explanation

Encryption is used as it converts plain text to cipher text and vice versa.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can be defined as a threat?

The likelihood of a cybercriminal getting caught

The likelihood of a cybercriminal getting caught

The probability that a cyber attack will be successful

The probability that a cyber attack will be successful

Answer explanation

A threat is a communicated intent to inflict harm or loss on another person.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the function of specifying user access rights/privileges to computing resources? 

Authentication

Enabling

Accounting

Duplication

Answer explanation

Enabling is the authority or means to do something; make it possible for a user to access a computing resource.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which concept describes the amount of confidence that an organisation has that its controls satisfy the necessary security requirements?

Assurance

Governance

Non-repudiation

Trust

Answer explanation

Assurance is defined as a positive declaration intended to give confidence; a promise.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which information security principle requires that an organisation SHOULD implement overlapping security controls wherever feasibly possible?

Separation of Duties

Fail Safe Configuration

Fail Safe Configuration

Web of Trust

Answer explanation

Defence in depth is a concept used in Information security in which multiple layers of security controls are placed throughout an information technology system.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

With the increasing global operation of many corporate organisations, which of the following is LIKELY to be the more important consideration with respect to information security?

Understanding that different countries have differing legislation with respect to how information can be handled

Ensuring that for all countries that an organisation has an office in, will all operate in the same time zone

Ensuring that regional preferences for security related hardware and software are adhered to

Storing all corporate data only in one country where an organisations central office is located

Answer explanation

As legislation is likely to vary between countries it must be the most important consideration.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Whilst drafting a company's information security policy, what would be an important consideration?

The policy should be a standalone document

The policy must be integral to all areas of an organisation

The policy should only be visible to senior management

The policy only applies to staff handling confidential information

Answer explanation

A company policy should apply to all areas of an organisation.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?