CTEC IT Unit 3 PH Virtual Challenges

CTEC IT Unit 3 PH Virtual Challenges

12th Grade

10 Qs

quiz-placeholder

Similar activities

คำถาม เรื่อง การวิเคราะห์ข้อมูลเชิงพรรณนา

คำถาม เรื่อง การวิเคราะห์ข้อมูลเชิงพรรณนา

12th Grade

15 Qs

Latihan soal

Latihan soal

9th - 12th Grade

15 Qs

7. Quiz Berpikir Komputasional

7. Quiz Berpikir Komputasional

7th Grade - University

10 Qs

infirmatika kelas 7

infirmatika kelas 7

7th Grade - University

15 Qs

Ulangan harian 1 Algoritma dan Pemrograman

Ulangan harian 1 Algoritma dan Pemrograman

12th Grade - University

13 Qs

tik  kelas 9

tik kelas 9

12th Grade

10 Qs

Quis Grade 5

Quis Grade 5

9th - 12th Grade

15 Qs

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

CTEC IT Unit 3 PH Virtual Challenges

CTEC IT Unit 3 PH Virtual Challenges

Assessment

Quiz

Computers

12th Grade

Practice Problem

Medium

Created by

Paul Shaddick

Used 10+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 5 pts

What are some potential threats to PH Virtual Challenges and its held data?

Tick all that apply

Service disruptions through denial of service attacks

Unauthorized access to customer activity data

Vulnerabilities in the system leading to exploitation by attackers

Unauthorized access to user profile pictures

2.

MULTIPLE SELECT QUESTION

1 min • 5 pts

How would PH Virtual Challenges initially respond to a cyber security incident

Tick all that apply

Hiding the incident from customers

Containing the incident

Eradicating the scope of the incident

Firing all employees involved with the breach

3.

MULTIPLE SELECT QUESTION

1 min • 5 pts

What kind of data is collected by PH Virtual Challenges?

Virtual Challenge level

Ages and genders of customers

Latitude and Longitude of activity locations

Timestamp including date

4.

MULTIPLE SELECT QUESTION

1 min • 5 pts

Why does the data collected by PH Virtual Challenges need protection?

Tick all that apply

location data allows tracking

A regular backup schedule is in place

Lack of encryption on user data

Contains personally identifiable information

5.

MULTIPLE SELECT QUESTION

1 min • 5 pts

Which are cyber security risk management measures

Tick all that apply

Identifying assets

Testing for vulnerabilities

Monitoring and controlling systems

Limiting data access

6.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Encryption is useful for controlling access to

Data in use

Data in the cloud

Data in transit

Data at rest

7.

FILL IN THE BLANK QUESTION

1 min • 5 pts

PH Virtual Challenges could be attacked by various threat actors.
What type of attacker is missing from this list:

hacktivist, cyber-criminal, script kiddie,

scammer, phisher, insider, cyber-terrorist

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?