
Mastering Cyber Safety and Security
Authored by James Adams
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following cryptographic protocols is used to provide end-to-end security for data in transit over the internet, and is considered more secure than its predecessor SSL?
TLS 1.0
TLS 1.3
SSL 3.0
SSH-2
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Under the Australian Privacy Principles (APPs), which principle specifically addresses the issue of cross-border disclosure of personal information?
APP 1
APP 8
APP 11
APP 13
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the context of network security, what is the primary function of the Diffie-Hellman key exchange protocol?
To encrypt data using symmetric keys
To securely exchange cryptographic keys over a public channel
To authenticate users in a network
To provide digital signatures
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware is specifically designed to provide unauthorized access to a user's computer without being detected by security programs?
Rootkit
Adware
Keylogger
Botnet
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of implementing a zero-trust security model in an organisation?
To eliminate the need for firewalls
To assume that threats could be both external and internal, and verify every request as though it originates from an open network
To simplify network architecture
To allow unrestricted access to all users
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the concept of "data minimisation" in data privacy?
Collecting as much data as possible for future use
Limiting data collection to what is directly relevant and necessary to accomplish a specific purpose
Storing data indefinitely for potential analysis
Sharing data with third parties for marketing purposes
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a characteristic of Advanced Persistent Threats (APTs)?
They are typically short-lived and easy to detect
They involve highly targeted and prolonged attacks often orchestrated by well-funded groups
They are usually random and opportunistic
They are primarily spread through email spam
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?