Cyber Security

Cyber Security

Professional Development

10 Qs

quiz-placeholder

Similar activities

Teachers and Cybersecurity

Teachers and Cybersecurity

Professional Development

15 Qs

Java main() and Scanner

Java main() and Scanner

Professional Development

10 Qs

Authentication and Authorization

Authentication and Authorization

Professional Development

10 Qs

beware of phishing

beware of phishing

Professional Development

10 Qs

Malware

Malware

Professional Development

15 Qs

Cyber Security ISA WRTD

Cyber Security ISA WRTD

Professional Development

11 Qs

Security Awareness Training

Security Awareness Training

Professional Development

10 Qs

System Ethical Hacking

System Ethical Hacking

Professional Development

10 Qs

Cyber Security

Cyber Security

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Alif Qayyum

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is called the collective terms of malicious software such as viruses, worms and trojans ?

worm

phishing

malware

spam

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following incident response steps involves actions to protect critical systems while maintaining business operations?

investigation

recovery

containment

lessons learned

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A network administrator needs to build out a new datacenter, with a focus on resiliency and uptime. Which of the following would BEST meet this objective? Choose two

dual power supply

off-sites backups

NIC teaming

automatic OS upgrades

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following cloud models provides clients with servers, storage, and networks but nothing else?

PaaS

IaaS

SaaS

DaaS

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An organization is developing a plan in the event of a complete loss of critical systems and data. Which of the following plans is the organization MOST likely developing?

Data retention

Disaster recovery

Communications

Incident response

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In which of the following risk management strategies would cybersecurity insurance be used?

Transference

Avoidance

Mitigation

Acceptance

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices. Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company's data?

Geofencing

Containerization

Full-disk encryption

Remote wipe

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?