23-24 Cybersecurity II S1 Exam Review By Mr B

23-24 Cybersecurity II S1 Exam Review By Mr B

12th Grade

60 Qs

quiz-placeholder

Similar activities

Networking Unit 1 Exam

Networking Unit 1 Exam

12th Grade

64 Qs

12c IT

12c IT

11th - 12th Grade

60 Qs

MIL 1st Quarter Exam

MIL 1st Quarter Exam

11th - 12th Grade

60 Qs

Review Quiz in CSS

Review Quiz in CSS

12th Grade

65 Qs

Network+ Ports

Network+ Ports

9th - 12th Grade

60 Qs

XII Networking & Cyber Security

XII Networking & Cyber Security

9th - 12th Grade

60 Qs

Internet Hardware

Internet Hardware

9th Grade - University

60 Qs

EHE Module 8 Wireless Security

EHE Module 8 Wireless Security

12th Grade

63 Qs

23-24 Cybersecurity II S1 Exam Review By Mr B

23-24 Cybersecurity II S1 Exam Review By Mr B

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Cyber Professor - Mr. B

Used 1+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Anny recently implemented an intrusion prevention system designed to block common network attacks from affecting his organization. What type of risk management strategy is Anny pursuing?

Risk Mitigation

Risk Acceptance

Risk Avoidance

Risk Transference

Answer explanation

Anny is pursuing a risk mitigation strategy by implementing an intrusion prevention system to block network attacks.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following principles expects an individual to behave reasonably under any given circumstance?

Due Care

Due Diligence

Separation of Duties

Least Privilege

Answer explanation

Due Care expects an individual to behave reasonably under any given circumstance.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of malware is characterized by spreading from system to system under its own power by exploiting vulnerabilities that do not require user intervention?

Worm

Trojan Horse

Virus

Logic Bomb

Answer explanation

A worm is a type of malware that spreads from system to system without user intervention by exploiting vulnerabilities. It is the correct choice because it spreads autonomously.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following security programs is designed to establish a minimum standard common denominator of security understanding?

Awareness

Training

Education

Indoctrination

Answer explanation

Awareness is a security program that establishes a minimum standard of security understanding. It promotes knowledge and highlights the correct choice.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is an example of physical infrastructure hardening?

Fire Suppression System

Two Factor-Authentication

Hardware-based Network Firewall

Antivirus Software

Answer explanation

Physical infrastructure hardening includes measures such as installing fire suppression systems to protect against fire hazards.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which information security goal is impacted when an organization experiences a DoS or DDoS attack?

Integrity

Confidentiality

Availability

Authenticity

Answer explanation

A DoS or DDoS attack impacts the availability of an organization's systems, making them inaccessible to users.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

 What is the best way to provide accountability for the use of identities?

Logging

Authorization

Digital Signatures

Type 1 Authentication

Answer explanation

Logging is the best way to provide accountability for the use of identities. It allows tracking and auditing of identity-related activities, ensuring transparency and accountability.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?