Cybersecurity Quiz 1

Cybersecurity Quiz 1

University

20 Qs

quiz-placeholder

Similar activities

Information and Communication Technology Security - Pre-Test

Information and Communication Technology Security - Pre-Test

University

20 Qs

Network Management and Operation

Network Management and Operation

University

15 Qs

Quiz1-OS

Quiz1-OS

University

20 Qs

MTA Security Fundamentals Lesson 1 Review

MTA Security Fundamentals Lesson 1 Review

10th Grade - Professional Development

21 Qs

System Implementation

System Implementation

University

22 Qs

INASEC1-SecurityTechnology 2324B

INASEC1-SecurityTechnology 2324B

University

15 Qs

Pre-Assessment: Distributed Systems III

Pre-Assessment: Distributed Systems III

University

20 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

Cybersecurity Quiz 1

Cybersecurity Quiz 1

Assessment

Quiz

Computers

University

Medium

Created by

Hasrulnizam Hashim

Used 6+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Which statement was FALSE about Cybersecurity?

Cybersecurity tools helps to keep your personal data, like passwords, financial information, and sensitive documents, safe from unauthorized access and potential harm.

Cybersecurity refers to the practice of protecting computer systems, networks, and data from unauthorized access, damage, theft, and other cyber threats.

Cybersecurity is like imagine your online life as a castle, and cybersecurity is the system of walls, gates, and guards that keep the bad guys (like hackers and cybercriminals) out and protect your valuable information.

Antivirus software alone is enough to protect your computer from all types of cyber threats, and using public Wi-Fi networks is always safe as long as you have a strong password for your device.

2.

MULTIPLE SELECT QUESTION

5 mins • 5 pts

What is Information Security?

Protecting sensitive and valuable information by employing encryption, access controls, and secure data storage and transmission methods.

The protection of available information or information resources from unauthorized access, attack, theft, or data damage.

Responsible individuals and organizations must secure confidential data.

Data in all forms must be protected.

This minimizes business risks and other consequences of losing crucial data.

3.

MULTIPLE SELECT QUESTION

5 mins • 5 pts

Information Security Goals?

Prevention

Detection

Recovery

Security

4.

MULTIPLE SELECT QUESTION

5 mins • 5 pts

Media Image

What is RISK?

A concept that indicates exposure to the chance of damage or loss and signifies the likelihood of a hazard or dangerous threat.

IT risk is associated with system, power, network, and physical losses.

Can also affect people, practices, and processes.

Any condition that leaves a device open to harm.

Any event or action that could potentially cause damage to an asset.

5.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Media Image

What is Vulnerabilities?

Any condition that leaves a device open to harm.

Improperly configured or installed hardware or software.

Bugs in software or OSs.

A technique used to exploit a vulnerability in an application or physical computer system without the authorization to do so.

6.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Media Image

What is Threats?

Any event or action that could potentially cause damage to an asset.

Misusing software or communication protocols.

Design flaws in software or OSs.

Safeguards and countermeasures, physical or logical.

7.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Media Image

What is Attacks?

A technique used to exploit a vulnerability in an application or physical computer system without the authorization to do so.

Untested software or firmware patches.

Discovering attempts to access unauthorized data, or that information has been lost

Countermeasures that you need to put in place to avoid, mitigate, or counteract security risks due to threats and attacks.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?