
Cybersecurity Essentials
Authored by Ritesh Choksi
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
64 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which Statement best describe a motivation of hacktivist?
They are trying to show off their hacking skills
They are interested in discob=ering new exploits
They are curious and learning hacking skills
They are part of a protect group behind a political cause
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement best describes a motivation of hacktivists?
They are trying to show off their hacking skills.
They are interested in discovering new exploits.
They are curious and learning hacking skills.
They are part of a protest group behind a political cause.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of cybercriminal is the most likely to create malware to compromise an organization by stealing credit card information?
white hat hackers
black hat hackers
gray hat hackers
script kiddies
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization allows employees to work from home two days a week. Which technology should be implemented to ensure data confidentiality as data is transmitted?
SHS
VLANS
RAID
VPN
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of networks poses increasing challenges to cybersecurity specialists due to the growth of BYOD on campus?
wireless networks
wired networks
sneaker net
virtual networks
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cybersecurity specialist is working with the IT staff to establish an effective information security plan. Which combination of security principles forms the foundation of a security plan?
confidentiality, integrity, and availability
technologies, policies, and awareness
secrecy, identify, and nonrepudiation
encryption, authentication, and identification
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which framework should be recommended for establishing a comprehensive information security management system in an organization?
ISO/IEC 27000
ISO OSI model
NIST/NICE framework
CIA Triad
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?