cybersecurity week 1 day 2

cybersecurity week 1 day 2

Professional Development

22 Qs

quiz-placeholder

Similar activities

FUN 101 Week 7 Test Bearings, Lubricants & Seals

FUN 101 Week 7 Test Bearings, Lubricants & Seals

Professional Development

20 Qs

Tech Talk elementary Units 4-7-8

Tech Talk elementary Units 4-7-8

Professional Development

20 Qs

QUIZ CTO BATCH II

QUIZ CTO BATCH II

Professional Development

20 Qs

Week one electronics

Week one electronics

Professional Development

17 Qs

MCSA -Mid Exam

MCSA -Mid Exam

Professional Development

20 Qs

CPA Prelims JY 2022

CPA Prelims JY 2022

8th Grade - Professional Development

20 Qs

(elem) Technology Routines

(elem) Technology Routines

Professional Development

18 Qs

Dashboard Rules

Dashboard Rules

Professional Development

20 Qs

cybersecurity week 1 day 2

cybersecurity week 1 day 2

Assessment

Quiz

Instructional Technology

Professional Development

Practice Problem

Hard

Created by

P P

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Under which law must healthcare enterprises guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format?

Sarbox

COPPA

GLBA

HIPAA

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attacker category might have the objective of retaliation against an employer?

Cybercriminal

Insider

hactivist

state-sponsored attacker

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a term associated with cybersecurity?

risk

information assurance

malware

goal

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is frequently used to describe the tasks of securing technology?

network security

information assurance

cybersecurity

information warfare

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Terrorists who turn their attacks to the network and computer infrastructure to cause panic among citizens are known as which of the following?

cyberterrorists

spies

hackers

hactivists

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the term for a hacker who probes a system for weaknesses and provides that information back to the organization?

gray hat hacker

white hat hacker

black hat hacker

red hat hacker

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you call a flaw or weakness in a computer system that allows access by threat actors?

risk

vulnerability

asset

threat

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?