cybersecurity week 1 day 2

cybersecurity week 1 day 2

Professional Development

22 Qs

quiz-placeholder

Similar activities

Identity Theft , Scams & Phishing

Identity Theft , Scams & Phishing

Professional Development

18 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

Computación 2

Computación 2

Professional Development

18 Qs

Cyber Policy Quiz 1

Cyber Policy Quiz 1

Professional Development

23 Qs

BCS Systems & Architecture Quiz 3

BCS Systems & Architecture Quiz 3

University - Professional Development

22 Qs

BCS System & Architecture Quiz 7

BCS System & Architecture Quiz 7

University - Professional Development

20 Qs

Konde technology quiz - Do you know your educational Apps?

Konde technology quiz - Do you know your educational Apps?

Professional Development

21 Qs

PowerPoint

PowerPoint

10th Grade - Professional Development

19 Qs

cybersecurity week 1 day 2

cybersecurity week 1 day 2

Assessment

Quiz

Instructional Technology

Professional Development

Hard

Created by

P P

Used 1+ times

FREE Resource

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Under which law must healthcare enterprises guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format?

Sarbox

COPPA

GLBA

HIPAA

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attacker category might have the objective of retaliation against an employer?

Cybercriminal

Insider

hactivist

state-sponsored attacker

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a term associated with cybersecurity?

risk

information assurance

malware

goal

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is frequently used to describe the tasks of securing technology?

network security

information assurance

cybersecurity

information warfare

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Terrorists who turn their attacks to the network and computer infrastructure to cause panic among citizens are known as which of the following?

cyberterrorists

spies

hackers

hactivists

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the term for a hacker who probes a system for weaknesses and provides that information back to the organization?

gray hat hacker

white hat hacker

black hat hacker

red hat hacker

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you call a flaw or weakness in a computer system that allows access by threat actors?

risk

vulnerability

asset

threat

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?