CIS27B Quiz 2 Review

CIS27B Quiz 2 Review

University

25 Qs

quiz-placeholder

Similar activities

Information assurance and security

Information assurance and security

University

25 Qs

Security Threats and Trust Boundaries

Security Threats and Trust Boundaries

University

20 Qs

Understanding Software Updates

Understanding Software Updates

10th Grade - University

25 Qs

Security

Security

University

23 Qs

Cybersecurity Essentials Chapter 8

Cybersecurity Essentials Chapter 8

10th Grade - University

25 Qs

SYO 701 INTRO TO SECURITY Module FC-1

SYO 701 INTRO TO SECURITY Module FC-1

University

20 Qs

Cybersecurity Quiz 1

Cybersecurity Quiz 1

University

20 Qs

Cybersecurity Threats and Prevention Quiz

Cybersecurity Threats and Prevention Quiz

9th Grade - University

20 Qs

CIS27B Quiz 2 Review

CIS27B Quiz 2 Review

Assessment

Quiz

Computers

University

Medium

Created by

Kasey Nguyen

Used 11+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a type of unintentional insider threats, who expose an organization sensitive information to a threat through carelessness?

imprudent insider threat

negligent insider threats

ignorant insider threats

accidental insider threats

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Determine the type of espionage when a Chief Information Officer (CIO) is paid to leak client data to a competing company.

government espionage

competitive espionage

criminal espionage

economic espionage

3.

MULTIPLE SELECT QUESTION

1 min • 2 pts

Determine the type of insider threats when an employee mistyped e-mail addresses and sent sensitive information to external recipients. Select all applied options.

accidental insider threats

unintentional insider threats

intentional insider threats

third-party insider threats

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Determine the type of insider threats when a staff member is collaborating with a branch manager to steal data from the organization for financial gains. 

third-party insider threats

collaborative insider threats

collusive insider threats

inclusive insider threats

5.

MULTIPLE SELECT QUESTION

1 min • 2 pts

Determine the type of espionage when a US researcher leaked US government weapon design to Russia for financial gains. Select all applied options.

government espionage

economic espionage

international espionage

criminal espionage

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following options is true when an engineering contractor steals machinery designs from the company to leverage his new job negotiation?

third-party property theft

economic crime

financial crime

intellectual property theft

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Determine the type of cyber insider threats when a manager removes group permissions from various folders and deletes important files from the network drives before leaving the company.

unintentional cyber insider threat

intentional cyber insider threat

organizational cyber insider threats

hierarchic cyber insider threats

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?