Cyber Security Fundamental-SP

Cyber Security Fundamental-SP

10th Grade

10 Qs

quiz-placeholder

Similar activities

CNN 10 News Quiz

CNN 10 News Quiz

9th - 12th Grade

8 Qs

Guess The Emoji Quiz

Guess The Emoji Quiz

1st - 12th Grade

11 Qs

SSS NPCC Campcraft Quiz 1

SSS NPCC Campcraft Quiz 1

7th - 10th Grade

10 Qs

Standards Classification Violation Level

Standards Classification Violation Level

9th - 12th Grade

10 Qs

World Health Day

World Health Day

10th Grade

10 Qs

Esport Studys Guide

Esport Studys Guide

9th - 12th Grade

15 Qs

Maslow's Hierarchy Review

Maslow's Hierarchy Review

9th - 12th Grade

10 Qs

E business and its benefits

E business and its benefits

10th - 12th Grade

11 Qs

Cyber Security Fundamental-SP

Cyber Security Fundamental-SP

Assessment

Quiz

Education

10th Grade

Medium

Created by

YOFI ANSHARY

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of a "something you know" authentication factor?

User ID

Password

Fingerprint

iris scan

Answer explanation

B is correct. A password is something the user knows and can present as an authentication factor to confirm an identity assertion. A is incorrect because a user ID is an identity assertion, not an authentication factor. C and D are incorrect as they are examples of authentication factors that are something you are, also referred to as "biometrics."

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Within the organization, who can identify risk?

The Security Manager

any security team member

senior management

anyone

Answer explanation

D is correct. Anyone within the organization can identify risk

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A vendor sells a particular operating system (OS). In order to deploy the OS securely on different platforms, the vendor publishes several sets of instructions on how to install it, depending on which platform the customer is using. This is an example of a .......

law

procedure

standard

policy

Answer explanation

B is correct. This is a set of instructions to perform a particular task, so it is a procedure (several procedures, actually—one for each platform). A is incorrect; the instructions are not a governmental mandate. C is incorrect, because the instructions are particular to a specific product, not accepted throughout the industry. D is incorrect, because the instructions are not particular to a given organization.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Of the following, which would probably not be considered a threat?

Natural DIsaster

Unintentional damage to the system caused by a user

A laptop with sensitivie data on it

An external attacker trying to gain unauthorized access to the environment

Answer explanation

C is correct. A laptop, and the data on it, are assets, not threats. All the other answers are examples of threats, as they all have the potential to cause adverse impact to the organization and the organization's assets.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

For which of the following assests is integrity probably the most important security aspect?

One frame of a streaming video

The file that contains passwords used to authenticate users

The color scheme of a marketing website

Software that checks the spelling of product descriptions for a retail website

Answer explanation

B is correct. If a password file is modified, the impact to the environment could be significant; there is a possibility that all authorized users could be denied access, or that anyone (including unauthorized users) could be granted access. The integrity of the password file is probably the most crucial of the four options listed. A is incorrect because one frame of an entire film, if modified, probably would have little to no effect whatsoever on the value of the film to the viewer; a film has thousands (or tens of thousands, or millions) of frames. C is incorrect because a change in marketing material, while significant, is not as crucial as the integrity of the password file described in Answer B. D is incorrect because a typo in a product description is not likely to be as important as the integrity of the password file described in Answer B

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Kerpak works in the security office of a medium-sized entertainment company. Kerpak is asked to assess a particular threat, and he suggests that the best way to counter this threat would be to purchase and implement a particular security solution. This is an example of ......

Acceptance

Avoidance

Mitigation

Transference

Answer explanation

C is correct. Applying a security solution (a type of control) is an example of mitigation. A is incorrect; if Kerpak suggested acceptance, then the threat, and the acceptance of the associated risk, only needs to be documented—no other action is necessary. B is incorrect; if Kerpak suggested avoidance, the course of action would be to cease whatever activity was associated with the threat. D is incorrect; if Kerpak suggested transference, this would involve forming some sort of risk-sharing relationship with an external party, such as an insurance underwriter.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The city of Grampon wants to know where all its public vehicles (garbage trucks, police cars, etc.) are at all times, so the city has GPS transmitters installed in all the vehicles. What kind of control is this?

Administrative

Entrenched

Physical

Technical

Answer explanation

D is correct. A GPS unit is part of the IT environment, so this is a technical control. A is incorrect. The GPS unit itself is not a rule or a policy or a process; it is part of the IT environment, so D is a better answer. B is incorrect; "entrenched" is not a term commonly used to describe a particular type of security control, and is used here only as a distractor. C is incorrect; while a GPS unit is a tangible object, it is also part of the IT environment, and it does not interact directly with other physical objects in order to prevent action, so "technical" is a better descriptor, and D is a better answer.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?