MAF682 TECHNOLOGY AND CYBER RISKS

MAF682 TECHNOLOGY AND CYBER RISKS

University

10 Qs

quiz-placeholder

Similar activities

RM 502 - Secondary Data & Crime Mapping

RM 502 - Secondary Data & Crime Mapping

University

10 Qs

Theories of Globalization

Theories of Globalization

University

11 Qs

Network Security

Network Security

University

11 Qs

Security Risk Management

Security Risk Management

11th Grade - Professional Development

10 Qs

Qualitative Analysis

Qualitative Analysis

University

10 Qs

Cloud Computing

Cloud Computing

University

10 Qs

Safety Simulation Prep

Safety Simulation Prep

University

9 Qs

Lesson 5 Quiz

Lesson 5 Quiz

University

11 Qs

MAF682 TECHNOLOGY AND CYBER RISKS

MAF682 TECHNOLOGY AND CYBER RISKS

Assessment

Quiz

Other

University

Hard

Created by

Nurathirah Zamri

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

10 sec • 1 pt

Technology risk is a _______ risk like other type of risks, therefore it creates both threats as well as opportunities for organizations

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which is NOT the way to mitigate the technology risk?

Secure Endpoint

Reinforce Network Infrastructure

Monitor And Analyze Security Threats Continuously

Analyze fraud detection and deterrence

3.

MULTIPLE SELECT QUESTION

10 sec • 1 pt

What is the potential impact of technology failure or breach?

Financial Losses

Data Exposure

Operational Disruption

Insurance Costs

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Misconfigured security settings, accidental data exposure, or improper handling of sensitive information.

These are the example of __________

Human error

Third - party risks

Cybersecurity threats

Hardware failures

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is an example of a cyber risk source that organizations need to be vigilant about?

A) Natural disasters B) Insider threats C) Competition from other businesses D) Regulatory compliance

Please select the correct option (A, B, C, or D) that best represents a cyber risk source.

A

B

C

D

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is a "phishing" attack typically designed to do?

A) Install antivirus software on the victim's computer

B) Gain unauthorized access to a network

C) Trick individuals into revealing sensitive information

D) Encrypt the victim's data

D

B

A

C

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the main purpose of a firewall in a network security context?

To steal sensitive data

To disrupt or overload a target's services

To deface a website

To block unwanted network traffic and protect against unauthorized access

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?