
Cloud Security: Investigate threats like unauthorized access or
Authored by Anonymous Anonymous
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 20 pts
would you like to implement required double verification into login systems
Yes: Employees are required to use DUO when login into the system
No: Employees can login into the system using username/password
2.
MULTIPLE CHOICE QUESTION
30 sec • 20 pts
would you like to implement password requirements
Yes: Employees are required to have password length of 12-14 characters, capital letters, numbers, special characters and cannot be a previous password
No: Employees can have password be any length with any characters
3.
MULTIPLE CHOICE QUESTION
30 sec • 20 pts
would you like to implement a intrusion prevention system (IPS)
Yes: You implemented a network security that will allow monitor and prevent malicious activity
No: You opted out of a network security that will allow monitor and prevent malicious activity
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
ALERT: THERE HAS BEEN A MALWARE ATTACK
THERE HAS BEEN A VULNERABILITY FOUND ALLOWING HACKERS TO LEAK ACCOUNT NUMBER AND INFORMATION
click to continue to the next question
click to continue to the next question
5.
MULTIPLE CHOICE QUESTION
30 sec • 20 pts
would you like to implement containment?
Yes: You immediately disconnected infected systems and isolated the affected network segment in order to prevent the malware from spreading
No: The malware ended up spreading rapidly across the network and lots of sensitive information was stolen. Widespread data loss harmed the company’s reputation
6.
MULTIPLE CHOICE QUESTION
30 sec • 20 pts
how will you address malware attack?
Implement a malware and cybersecurity awareness training for all employees:
Employees are better equipped and are less likely to fall for any malware attempt
Do not conduct any additional training: Several employees fall victim to malware attempts leaving to more exposed sensitive information
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?