Review - Foundations - Cybersecurity Quiz

Review - Foundations - Cybersecurity Quiz

University

15 Qs

quiz-placeholder

Similar activities

Technology Enriched Teaching

Technology Enriched Teaching

University

10 Qs

ILC 1-to-1 Economics Collocations

ILC 1-to-1 Economics Collocations

University - Professional Development

16 Qs

Presentation Structure

Presentation Structure

University

12 Qs

ELT_Course Design & Formulating goals and objectives

ELT_Course Design & Formulating goals and objectives

University - Professional Development

10 Qs

Bloom's Taxonomy Quizs

Bloom's Taxonomy Quizs

University

20 Qs

English Pedagogy B. Ed. I year Unit I and II

English Pedagogy B. Ed. I year Unit I and II

University

10 Qs

ANALYSING LEARNING OUTCOMES, DEVELOPING LEARNING OBJECTIVES  AND

ANALYSING LEARNING OUTCOMES, DEVELOPING LEARNING OBJECTIVES AND

University

10 Qs

Business circle

Business circle

University

15 Qs

Review - Foundations - Cybersecurity Quiz

Review - Foundations - Cybersecurity Quiz

Assessment

Quiz

English

University

Easy

Created by

Max Trần

Used 68+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The privacy protection of files on a local network can be best secured by:

SSL encryption on transfer.

Audit trails of document usage

Virus protection software.

Setting user permissions to restrict access.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT part of a good data management strategy?

Creating a strong data process

Identifying business objectives

Finding the right technologies

Installing malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Poor information security strategies are most likely to lead to:

A dynamic information culture

Financial loss and legal consequences

Advantage for the organisation over other companies

Operational disruptions and an increase in perceived reliability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Physical security for preventing unauthorised access include:

Locks.

Patching systems to the latest update.

Segmented networks.

User permission restrictions .

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of concern is bias in data analysis?

Legal

Ethical

Financial

Validation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

A type of cyber attack that exploits software vulnerabilities

A method of securing sensitive data using encryption

A technique for monitoring network traffic

An attempt to deceive individuals into revealing secure information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best description of the goal of cybersecurity?

Providing security against malware

Protecting a system to protect against cyber attacks

Protecting the confidentiality, integrity, and availability of information and systems

Ensuring privacy for users

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?