InfoSec Quiz 1

InfoSec Quiz 1

University

15 Qs

quiz-placeholder

Similar activities

Python_Quiz_1

Python_Quiz_1

University

10 Qs

Tin 7 Bài 8

Tin 7 Bài 8

7th Grade - University

10 Qs

Keyboard Shortcuts

Keyboard Shortcuts

5th Grade - University

11 Qs

Quiz Administrasi Perkantoran

Quiz Administrasi Perkantoran

9th Grade - University

20 Qs

Repaso Unidad I | CMS

Repaso Unidad I | CMS

University

10 Qs

OOP-Q1

OOP-Q1

University

10 Qs

Java_Quiz_Part_2

Java_Quiz_Part_2

University

12 Qs

NoSQL Concepts 2

NoSQL Concepts 2

University

10 Qs

InfoSec Quiz 1

InfoSec Quiz 1

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Ardi Moran

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software company wants to adopt a security framework that ensures compliance with industry regulations and improves its overall security posture.

Which of the following frameworks should they consider?

NIST Cybersecurity Framework

COBIT

ISO/IEC 27001

All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user reports that their files have become inaccessible and are displaying a message demanding payment for decryption.
What type of malware is involved?

Spyware

Trojan horse

Ransomware

Adware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company's IT team discovers an attacker has gained unauthorized access to their internal systems through a vulnerability that had a patch released three months ago but was never applied.

What could have prevented this security breach?

Regular software updates and patch management

Disabling all network connections

Encrypting all incoming emails

Blocking all remote access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker bombards a company's web server with a massive amount of fake traffic, causing it to crash.

Which type of attack is taking place?

SQL Injection

Denial-of-service (DoS)

Insider threat

Phishing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to ensure its data remains available to employees even in the event of a cyberattack.
Which security principle does this align with?

Confidentiality

Integrity

Availability

Redundancy

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee working remotely logs into a company system using only a simple password. Later, unauthorized access is detected from an unknown device.
What security measure could have prevented this incident?

Multi-factor authentication (MFA)

Disabling employee remote access

Allowing password reuse

Using a default VPN

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company's database containing customer information was accessed by an unauthorized individual. The company discovered that a weak default password was still being used for administrative access.
Which security vulnerability contributed to this breach?

Social engineering

Outdated antivirus software

Use of default credentials

Secure encryption protocols

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?