Introduction to Cybersecurity

Introduction to Cybersecurity

12th Grade

•

30 Qs

quiz-placeholder

Similar activities

Abstraction and Decomposition

Abstraction and Decomposition

12th Grade

•

25 Qs

ULANGAN SEMESTER GENAP MAPEL SKD

ULANGAN SEMESTER GENAP MAPEL SKD

12th Grade - University

•

25 Qs

Adobe Illustrator Quiz Review

Adobe Illustrator Quiz Review

9th - 12th Grade

•

27 Qs

Search Algorithms

Search Algorithms

9th - 12th Grade

•

25 Qs

Computational Thinking, Algorithms & Flowcharts

Computational Thinking, Algorithms & Flowcharts

8th - 12th Grade

•

28 Qs

Principles of Business chapter 1

Principles of Business chapter 1

9th - 12th Grade

•

25 Qs

Introduction to Cybersecurity

Introduction to Cybersecurity

Assessment

Quiz

•

Computers

•

12th Grade

•

Medium

Created by

Mary Williams

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following cybersecurity frameworks strive to improve the infrastructure of an organization's cybersecurity practices by providing standard methods and processes for combatting attacks?

Payment Card Industry Data Security Standard (PCI DSS)

NIST Framework

SAFETY Framework

Organization of Cybersecurity 27005

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a form of security which focuses on making programs more secure throughout their lifecycle?

Application security

Information security

Disaster recovery

Operational security

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Eric and his team are building a firewall for a system which acts as a barrier to unwanted data transfer. Which of the following type of security are they using?

Information security

Disaster recovery

Network security

Continuity planning

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A bank is setting up a security system to safeguard their data from unauthorized access or changes. Which of the following type of security should they be using?

Application security

Information security

Disaster recovery

Operational security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT one of the key concepts of information assurance?

Communication

Authorization

Confidentiality

Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a function of a cybersecurity framework?

Identify vulnerabilities within an organization

Protect the organization's information and assets

Inform the security team when authorized access is granted to a system

Respond to breaches and intrusions

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of frameworks is a set arrangement of activities for cyber protection to stop common attacks on systems?

Critical Security Controls (CIS)

Payment Card Industry Data Security Standard (PIC DSS)

International Organization for Standardization (ISO 27001 27002)

NIST Framework

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?