Quiz CA1 Sample

Quiz CA1 Sample

Professional Development

10 Qs

quiz-placeholder

Similar activities

Bullying exam

Bullying exam

Professional Development

11 Qs

Pemutakhiran Data SIMSPAM di Provinsi Jawa Tengah

Pemutakhiran Data SIMSPAM di Provinsi Jawa Tengah

Professional Development

10 Qs

SIB - Knowkledge Check Quiz July - W28

SIB - Knowkledge Check Quiz July - W28

Professional Development

11 Qs

The Legend of Zelda

The Legend of Zelda

KG - Professional Development

10 Qs

Guess The Singer😀

Guess The Singer😀

KG - Professional Development

15 Qs

Saint Seiya Quiz

Saint Seiya Quiz

KG - Professional Development

10 Qs

My Quiz

My Quiz

KG - Professional Development

15 Qs

Sony Pictures Hack

Sony Pictures Hack

Professional Development

6 Qs

Quiz CA1 Sample

Quiz CA1 Sample

Assessment

Quiz

Other

Professional Development

Medium

Created by

Alvin Low

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

 What does the CIA triad stand for in information security?

Central Intelligence Agency

Confidentiality, Integrity, Authorization

Confidentiality, Integrity, Availability

Cybersecurity, Intrusion Detection, Authentication

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is NOT a principle of the 5 Fundamental Security Principles mentioned?

Layering

Complexity

Obscurity

Diversity

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a reason for the difficulty in defending against modern cyber-attacks?

Universally connected devices

Complex infrastructure of target

Greater sophistication of attacks

All of the above

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is NOT a type of malware?

Ransomware

Worms

Phising

Trojans

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is not a software-based attack?

SQL Injection

Replay

Attacking your software

Using software to attack your system

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Social Engineering Attacks include the following methods except …

Phising

Email compromise

BIOS firmware attack

Tailgating

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What of the following is not normally a cause of workplace information security risk?

Using 2-factor authentication (2FA)

Ignoring software updates

Using weak passwords

Mishandling of sensitive information

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?