Information Assurance and Security

Information Assurance and Security

University

10 Qs

quiz-placeholder

Similar activities

Test Development

Test Development

University

10 Qs

Quiz Time!

Quiz Time!

University

10 Qs

Business Ethics

Business Ethics

University

10 Qs

BAC1054 Process Costing

BAC1054 Process Costing

University

15 Qs

BTS

BTS

University

10 Qs

UK Knowledge Test

UK Knowledge Test

University

10 Qs

BCSI AWARENESS

BCSI AWARENESS

KG - Professional Development

15 Qs

DS

DS

University

8 Qs

Information Assurance and Security

Information Assurance and Security

Assessment

Quiz

Other

University

Practice Problem

Medium

Created by

Alma Alid-ab

Used 68+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

You are a junior IT staff member at a mid-sized company. One morning, you receive an email that appears to be from your company’s HR department, asking you to update your direct deposit information. The email includes a link to a login page that looks similar to your company's internal portal.

Click the link and update your information

Report the email to the IT security team as a potential phishing attempt.

Ignore the email, assuming it's a mistake

2.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

  • As a security analyst, you notice unusual network traffic late at night. Upon investigation, you find that large amounts of data are being transferred to an external IP address. This raises concerns that a data breach might be in progress.

  • Task: Decide your next steps.

  1. Immediately block the IP address and halt the data transfer.

  1. Monitor the traffic for a while longer to gather more information.

  1. Report the incident to your supervisor without taking any immediate action

3.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

  • You are the IT manager at a healthcare facility. One morning, you find that all critical patient files have been encrypted, and a ransom note demands payment in Bitcoin to decrypt them. The note warns that any attempt to restore from backups will result in the deletion of the encryption keys.

  • Task: Choose how to respond.

Pay the ransom to quickly regain access to the files.

Attempt to restore the files from a backup despite the warning

Contact law enforcement and refuse to pay the ransom.

4.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

  • You are part of the internal security team. An employee has been acting suspiciously, accessing sensitive files that are outside their job responsibilities. This behavior has raised red flags, and you suspect they might be preparing to exfiltrate confidential information.

  • Task: Decide how to handle the situation.

Confront the employee directly and ask about their behavior.

Monitor their activities more closely without alerting them.

Report the incident to HR and legal for a more formal investigation.

5.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

As part of a regular security audit, you discover that a critical server in your organization is running outdated software with a known vulnerability. This server handles sensitive customer data, and the vulnerability could allow remote code execution.

Task: Decide how to respond.

Immediately apply the patch and restart the server, even though it could cause downtime during business hours.

Schedule the patching for after business hours to avoid disruption.

Leave the server unpatched but increase monitoring until you can determine the best time to apply the patch.

6.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

"You receive an email from HR asking you to update your bank details. The email looks official, but something feels off. What do you do?"

Click the link and update your details.

Report the email to IT security.

Ignore the email.

7.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What is the best overall approach to handling a security incident?"

Act quickly and decisively.

Gather all possible information before acting.

Avoid making decisions and defer to others.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?