Search Header Logo

Unit 3 - Cyber Security Revision 2

Authored by Elizabeth Gist

Computers

Used 11+ times

Unit 3 - Cyber Security Revision 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not a field in a Cyber Security Incident Report

Target of the incident

Incident category

Type of attacker

Name of the incident

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the most serious category of incident

Critical

Significant

Minor

Negligible

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Anyone who commits a cyber crime by breaking national or international law

Cyber Terrorist

Scammer

Phisher

Cyber Criminal

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Allowing information to pass to any person without permission

Unauthorised Access

Unauthorised Inspection

Unaithorised Modification

Unauthorised Disclosure

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The first phase of the vulnerability management lifecycle

Verify

Assess

Discover

Remediate

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Once a vulnerability is identified we have to take corrective action, this is known as

Fixing

Remediation

Monitoring

Assessing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is a valid type of privilege escalation?

Vertical

Positional

Subterranean

Global

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?