MAF682 TECHNOLOGY AND CYBER RISKS

MAF682 TECHNOLOGY AND CYBER RISKS

University

10 Qs

quiz-placeholder

Similar activities

Cybersecurity Terminology Quiz Part 2

Cybersecurity Terminology Quiz Part 2

University

15 Qs

Quiz 2 PAS2343 CLO2

Quiz 2 PAS2343 CLO2

University

11 Qs

Software Project Management Quiz

Software Project Management Quiz

University

10 Qs

EA Pop Quiz 1

EA Pop Quiz 1

University

10 Qs

LITE Lesson 04_IT Trends, Issues, and Challenges Quiz

LITE Lesson 04_IT Trends, Issues, and Challenges Quiz

University

10 Qs

Introduction to New Media

Introduction to New Media

University

10 Qs

Mastering Operations Skills

Mastering Operations Skills

University

15 Qs

Technology as a Way of Revealing

Technology as a Way of Revealing

University

15 Qs

MAF682 TECHNOLOGY AND CYBER RISKS

MAF682 TECHNOLOGY AND CYBER RISKS

Assessment

Quiz

Other

University

Hard

Created by

Nurathirah Zamri

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

10 sec • 1 pt

Technology risk is a _______ risk like other type of risks, therefore it creates both threats as well as opportunities for organizations

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which is NOT the way to mitigate the technology risk?

Secure Endpoint

Reinforce Network Infrastructure

Monitor And Analyze Security Threats Continuously

Analyze fraud detection and deterrence

3.

MULTIPLE SELECT QUESTION

10 sec • 1 pt

What is the potential impact of technology failure or breach?

Financial Losses

Data Exposure

Operational Disruption

Insurance Costs

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Misconfigured security settings, accidental data exposure, or improper handling of sensitive information.

These are the example of __________

Human error

Third - party risks

Cybersecurity threats

Hardware failures

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is an example of a cyber risk source that organizations need to be vigilant about?

A) Natural disasters B) Insider threats C) Competition from other businesses D) Regulatory compliance

Please select the correct option (A, B, C, or D) that best represents a cyber risk source.

A

B

C

D

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is a "phishing" attack typically designed to do?

A) Install antivirus software on the victim's computer

B) Gain unauthorized access to a network

C) Trick individuals into revealing sensitive information

D) Encrypt the victim's data

D

B

A

C

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the main purpose of a firewall in a network security context?

To steal sensitive data

To disrupt or overload a target's services

To deface a website

To block unwanted network traffic and protect against unauthorized access

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?