
IAaS Quiz 1 - Prelim
Authored by ELISA DANIOT
Computers
University
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
35 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A medium-sized company has frequent malware infections. They bring in a professional who evaluates the network, identifies weak spots, and creates a plan to improve protection without redesigning the entire system.
Which role best fits this scenario?
Security Architect
CISO
Security Consultant
Ethical Hacker
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A university discovers that hackers tried to access student grades by sending fake login pages to professors. To prevent this, the IT team adds two-factor authentication and educates staff about phishing.
What practice does this represent?
Data Analytics
Cybersecurity
Deep Learning
Social Engineering
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A financial institution hires a specialist to try to bypass logins, exploit weak passwords, and break into their online banking system—all legally and with permission. Afterward, they submit a report of vulnerabilities and solutions.
Which role is at work here?
Security Architect
Ethical Hacker (White Hat Hacker)
Chief Information Security Officer (CISO)
Security Consultant
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A multinational company is expanding its cloud infrastructure. Before the launch, a professional is tasked to design multiple layers of defense—firewalls, encryption, and access controls—to prevent hackers from breaking into the servers.
Which cybersecurity role does this describe?
Security Consultant
Security Architect
Chief Information Security Officer (CISO)
Ethical Hacker
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A hacker spends days collecting employee email addresses and scanning the company website for hidden vulnerabilities before attempting a break-in.
Which hacking phase does this describe?
Attack
Reconnaissance
Expansion
Obfuscation
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
A global healthcare company needs someone to oversee its entire security strategy, manage the teams that protect sensitive patient data, prevent data breaches, and ensure compliance with regulations.
Which role is responsible here?
Security Architect
Ethical Hacker
Security Consultant
Chief Information Security Officer (CISO)
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
To avoid getting caught, a hacker deletes system logs and uses fake user accounts, making it harder for investigators to trace the breach.
This action belongs to:
Attack
Expansion
Reconnaissance
Obfuscation
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?