Search Header Logo

Cloud Security: Investigate threats like unauthorized access or

Authored by Anonymous Anonymous

Computers

University

Used 1+ times

Cloud Security: Investigate threats like unauthorized access or
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

would you like to implement required double verification into login systems

Yes: Employees are required to use DUO when login into the system

No: Employees can login into the system using username/password

2.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

would you like to implement password requirements

Yes: Employees are required to have password length of 12-14 characters, capital letters, numbers, special characters and cannot be a previous password

No: Employees can have password be any length with any characters

3.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

would you like to implement a intrusion prevention system (IPS)

Yes: You implemented a network security that will allow monitor and prevent malicious activity

No: You opted out of a network security that will allow monitor and prevent malicious activity

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

ALERT: THERE HAS BEEN A MALWARE ATTACK

THERE HAS BEEN A VULNERABILITY FOUND ALLOWING HACKERS TO LEAK ACCOUNT NUMBER AND INFORMATION


click to continue to the next question

click to continue to the next question

5.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

would you like to implement containment?

Yes: You immediately disconnected infected systems and isolated the affected network segment in order to prevent the malware from spreading

No: The malware ended up spreading rapidly across the network and lots of sensitive information was stolen. Widespread data loss harmed the company’s reputation

6.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

how will you address malware attack?

Implement a malware and cybersecurity awareness training for all employees:

Employees are better equipped and are less likely to fall for any malware attempt

Do not conduct any additional training: Several employees fall victim to malware attempts leaving to more exposed sensitive information

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?