Search Header Logo

BSBSXCS420- 2023 s2

Authored by David Hunt

Design

Professional Development

Used 3+ times

BSBSXCS420- 2023 s2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is a type of malicious software (malware)?

Phishing

Ransomware

Multi-Factor Authentication

Backups

Answer explanation

Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common method used by attackers to steal sensitive information?

Phishing

Ransomware

Software updates

Multi-Factor Authentication

Answer explanation

Phishing is a cyber attack that uses disguised email as a weapon to trick the email recipient into believing that the message is something they want or need.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are operating system and software updates essential in cybersecurity?

They add new features to your programs.

They allow the software to run faster.

They can fix security vulnerabilities in the software.

They change the look and feel of the software.

Answer explanation

They can fix security vulnerabilities in the software. Explanation: OS and software updates often include patches to fix security vulnerabilities that have been discovered.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of having backups in cybersecurity?

To prevent unauthorized access

To recover data in case of data loss or a security incident

To update software

To protect against malware

Answer explanation

Backups are crucial to restore original data in the event of data loss, data corruption, or a security incident.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is an added layer of security, apart from just username and password?

Phishing

Ransomware

Multi-Factor Authentication

Malware

Answer explanation

Multi-Factor Authentication provides an additional layer of security that requires users to prove their identity in multiple ways before gaining access to a computer system or application.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of access control in cybersecurity?

To perform software updates

To send phishing emails

To control who can access information on a network

To create backups of information

Answer explanation

Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following needs to be protected to prevent identity theft?

Phishing emails

Malware

Sensitive data

Ransomware

Answer explanation

Sensitive data like personal identification information, financial information, etc., need to be protected to prevent identity theft.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?