Cyber Security

Cyber Security

Professional Development

10 Qs

quiz-placeholder

Similar activities

CJS - Cyber Hygiene & Cybersecurity Awareness Workshop

CJS - Cyber Hygiene & Cybersecurity Awareness Workshop

Professional Development

10 Qs

Computer Science

Computer Science

Professional Development

10 Qs

ISC2 - Chapter 4 - Module 2

ISC2 - Chapter 4 - Module 2

Professional Development

15 Qs

Spot the phish

Spot the phish

Professional Development

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Prevention

Prevention

1st Grade - Professional Development

10 Qs

Fundamentals of Cybersecurity

Fundamentals of Cybersecurity

Professional Development

15 Qs

QUIZ

QUIZ

Professional Development

9 Qs

Cyber Security

Cyber Security

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Alif Qayyum

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is called the collective terms of malicious software such as viruses, worms and trojans ?

worm

phishing

malware

spam

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following incident response steps involves actions to protect critical systems while maintaining business operations?

investigation

recovery

containment

lessons learned

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A network administrator needs to build out a new datacenter, with a focus on resiliency and uptime. Which of the following would BEST meet this objective? Choose two

dual power supply

off-sites backups

NIC teaming

automatic OS upgrades

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following cloud models provides clients with servers, storage, and networks but nothing else?

PaaS

IaaS

SaaS

DaaS

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An organization is developing a plan in the event of a complete loss of critical systems and data. Which of the following plans is the organization MOST likely developing?

Data retention

Disaster recovery

Communications

Incident response

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In which of the following risk management strategies would cybersecurity insurance be used?

Transference

Avoidance

Mitigation

Acceptance

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices. Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company's data?

Geofencing

Containerization

Full-disk encryption

Remote wipe

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?