Search Header Logo

IAaS Quiz 1 - Prelim

Authored by ELISA DANIOT

Computers

University

Used 6+ times

IAaS Quiz 1 - Prelim
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A medium-sized company has frequent malware infections. They bring in a professional who evaluates the network, identifies weak spots, and creates a plan to improve protection without redesigning the entire system.
Which role best fits this scenario?

Security Architect

CISO

Security Consultant

Ethical Hacker

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A university discovers that hackers tried to access student grades by sending fake login pages to professors. To prevent this, the IT team adds two-factor authentication and educates staff about phishing.
What practice does this represent?

Data Analytics

Cybersecurity

Deep Learning

Social Engineering

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A financial institution hires a specialist to try to bypass logins, exploit weak passwords, and break into their online banking system—all legally and with permission. Afterward, they submit a report of vulnerabilities and solutions.
Which role is at work here?

Security Architect

Ethical Hacker (White Hat Hacker)

Chief Information Security Officer (CISO)

Security Consultant

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A multinational company is expanding its cloud infrastructure. Before the launch, a professional is tasked to design multiple layers of defense—firewalls, encryption, and access controls—to prevent hackers from breaking into the servers.
Which cybersecurity role does this describe?

Security Consultant

Security Architect

Chief Information Security Officer (CISO)

Ethical Hacker

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A hacker spends days collecting employee email addresses and scanning the company website for hidden vulnerabilities before attempting a break-in.

Which hacking phase does this describe?

Attack

Reconnaissance

Expansion

Obfuscation

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A global healthcare company needs someone to oversee its entire security strategy, manage the teams that protect sensitive patient data, prevent data breaches, and ensure compliance with regulations.
Which role is responsible here?

Security Architect

Ethical Hacker

Security Consultant

Chief Information Security Officer (CISO)

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

To avoid getting caught, a hacker deletes system logs and uses fake user accounts, making it harder for investigators to trace the breach.
This action belongs to:

Attack

Expansion

Reconnaissance

Obfuscation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?