Search Header Logo

Cybersecurity Quiz 1

Authored by Hasrulnizam Hashim

Computers

University

Used 6+ times

Cybersecurity Quiz 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Which statement was FALSE about Cybersecurity?

Cybersecurity tools helps to keep your personal data, like passwords, financial information, and sensitive documents, safe from unauthorized access and potential harm.

Cybersecurity refers to the practice of protecting computer systems, networks, and data from unauthorized access, damage, theft, and other cyber threats.

Cybersecurity is like imagine your online life as a castle, and cybersecurity is the system of walls, gates, and guards that keep the bad guys (like hackers and cybercriminals) out and protect your valuable information.

Antivirus software alone is enough to protect your computer from all types of cyber threats, and using public Wi-Fi networks is always safe as long as you have a strong password for your device.

2.

MULTIPLE SELECT QUESTION

5 mins • 5 pts

What is Information Security?

Protecting sensitive and valuable information by employing encryption, access controls, and secure data storage and transmission methods.

The protection of available information or information resources from unauthorized access, attack, theft, or data damage.

Responsible individuals and organizations must secure confidential data.

Data in all forms must be protected.

This minimizes business risks and other consequences of losing crucial data.

3.

MULTIPLE SELECT QUESTION

5 mins • 5 pts

Information Security Goals?

Prevention

Detection

Recovery

Security

4.

MULTIPLE SELECT QUESTION

5 mins • 5 pts

Media Image

What is RISK?

A concept that indicates exposure to the chance of damage or loss and signifies the likelihood of a hazard or dangerous threat.

IT risk is associated with system, power, network, and physical losses.

Can also affect people, practices, and processes.

Any condition that leaves a device open to harm.

Any event or action that could potentially cause damage to an asset.

5.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Media Image

What is Vulnerabilities?

Any condition that leaves a device open to harm.

Improperly configured or installed hardware or software.

Bugs in software or OSs.

A technique used to exploit a vulnerability in an application or physical computer system without the authorization to do so.

6.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Media Image

What is Threats?

Any event or action that could potentially cause damage to an asset.

Misusing software or communication protocols.

Design flaws in software or OSs.

Safeguards and countermeasures, physical or logical.

7.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Media Image

What is Attacks?

A technique used to exploit a vulnerability in an application or physical computer system without the authorization to do so.

Untested software or firmware patches.

Discovering attempts to access unauthorized data, or that information has been lost

Countermeasures that you need to put in place to avoid, mitigate, or counteract security risks due to threats and attacks.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?