
23-24 Cybersecurity II S1 Exam Review By Mr B
Authored by Cyber Professor - Mr. B
Computers
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
60 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Anny recently implemented an intrusion prevention system designed to block common network attacks from affecting his organization. What type of risk management strategy is Anny pursuing?
Risk Mitigation
Risk Acceptance
Risk Avoidance
Risk Transference
Answer explanation
Anny is pursuing a risk mitigation strategy by implementing an intrusion prevention system to block network attacks.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following principles expects an individual to behave reasonably under any given circumstance?
Due Care
Due Diligence
Separation of Duties
Least Privilege
Answer explanation
Due Care expects an individual to behave reasonably under any given circumstance.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What type of malware is characterized by spreading from system to system under its own power by exploiting vulnerabilities that do not require user intervention?
Worm
Trojan Horse
Virus
Logic Bomb
Answer explanation
A worm is a type of malware that spreads from system to system without user intervention by exploiting vulnerabilities. It is the correct choice because it spreads autonomously.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which one of the following security programs is designed to establish a minimum standard common denominator of security understanding?
Awareness
Training
Education
Indoctrination
Answer explanation
Awareness is a security program that establishes a minimum standard of security understanding. It promotes knowledge and highlights the correct choice.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which one of the following is an example of physical infrastructure hardening?
Fire Suppression System
Two Factor-Authentication
Hardware-based Network Firewall
Antivirus Software
Answer explanation
Physical infrastructure hardening includes measures such as installing fire suppression systems to protect against fire hazards.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which information security goal is impacted when an organization experiences a DoS or DDoS attack?
Integrity
Confidentiality
Availability
Authenticity
Answer explanation
A DoS or DDoS attack impacts the availability of an organization's systems, making them inaccessible to users.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the best way to provide accountability for the use of identities?
Logging
Authorization
Digital Signatures
Type 1 Authentication
Answer explanation
Logging is the best way to provide accountability for the use of identities. It allows tracking and auditing of identity-related activities, ensuring transparency and accountability.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?