Introduction to Cybersecurity

Introduction to Cybersecurity

12th Grade

30 Qs

quiz-placeholder

Similar activities

TECH SUMMER CHALLENGE AGE 13-17

TECH SUMMER CHALLENGE AGE 13-17

9th - 12th Grade

25 Qs

STS GENAP TIK 9

STS GENAP TIK 9

9th Grade - University

25 Qs

Tugas Kuis Bandwidth - 2

Tugas Kuis Bandwidth - 2

12th Grade

25 Qs

Informatika Sekarang

Informatika Sekarang

12th Grade

25 Qs

Test Perangkat jaringan Komputer dan Internet

Test Perangkat jaringan Komputer dan Internet

12th Grade

25 Qs

Briana Review

Briana Review

12th Grade

25 Qs

YR12 FEB 2020 Assessment

YR12 FEB 2020 Assessment

12th Grade

25 Qs

CSCu_Data Encrypt

CSCu_Data Encrypt

9th - 12th Grade

25 Qs

Introduction to Cybersecurity

Introduction to Cybersecurity

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Mary Williams

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following cybersecurity frameworks strive to improve the infrastructure of an organization's cybersecurity practices by providing standard methods and processes for combatting attacks?

Payment Card Industry Data Security Standard (PCI DSS)

NIST Framework

SAFETY Framework

Organization of Cybersecurity 27005

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a form of security which focuses on making programs more secure throughout their lifecycle?

Application security

Information security

Disaster recovery

Operational security

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Eric and his team are building a firewall for a system which acts as a barrier to unwanted data transfer. Which of the following type of security are they using?

Information security

Disaster recovery

Network security

Continuity planning

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A bank is setting up a security system to safeguard their data from unauthorized access or changes. Which of the following type of security should they be using?

Application security

Information security

Disaster recovery

Operational security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT one of the key concepts of information assurance?

Communication

Authorization

Confidentiality

Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a function of a cybersecurity framework?

Identify vulnerabilities within an organization

Protect the organization's information and assets

Inform the security team when authorized access is granted to a system

Respond to breaches and intrusions

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of frameworks is a set arrangement of activities for cyber protection to stop common attacks on systems?

Critical Security Controls (CIS)

Payment Card Industry Data Security Standard (PIC DSS)

International Organization for Standardization (ISO 27001 27002)

NIST Framework

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?