Introduction to Cybersecurity Tools and Cyberattacks

Introduction to Cybersecurity Tools and Cyberattacks

University

85 Qs

quiz-placeholder

Similar activities

ITPC12 Reviewer ch1

ITPC12 Reviewer ch1

University

85 Qs

Computer skills - Chapter 2

Computer skills - Chapter 2

University

82 Qs

Internet of Things

Internet of Things

University

81 Qs

CIA Triad and Security Concepts Quiz

CIA Triad and Security Concepts Quiz

University

80 Qs

Final Exam Prep Review

Final Exam Prep Review

University

87 Qs

Quiz6,7 COOS295

Quiz6,7 COOS295

12th Grade - University

82 Qs

ITF+ pt2

ITF+ pt2

9th Grade - Professional Development

85 Qs

Server 2019 Chapters 4-6 Test Review

Server 2019 Chapters 4-6 Test Review

University

80 Qs

Introduction to Cybersecurity Tools and Cyberattacks

Introduction to Cybersecurity Tools and Cyberattacks

Assessment

Quiz

Computers

University

Easy

Created by

Денис Ленин

Used 14+ times

FREE Resource

85 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following legislative acts or agencies effectively ended the National Security Agency’s bulk collection of phone metadata?

USA Freedom Act

National Cyber Security Division(NCSD)

USA Patriot Act

Department of Homeland Security(DHS)

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

How are organizations safeguarding their resources with the virtual shift following the COVID-19 pandemic? Select all that apply.

Creating bring-your-own-device(BYOD) policies

Intensifying cybersecurity awareness training for employees

Encoutaging employees to use public Wi-Fi networks for work

Providing employees with antivirus licenses for their personal computers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

State True or False
National Security Decision Directives (NSDD 145) was America’s first national policy on telecommunication and automated information systems security.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The history of cybersecurity dates back several decades. When did the first computer worm, Creeper, emerge?

2000

1971

2010

1987

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which concept encourages software and system developers to integrate security features at the start of the development cycle?

Advanced encryption

National cybersecurity

Global surveillance

Security by design

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following illustrates the application of critical thinking in cybersecurity?

Performing routine backups

Conducting vulnerability scans

Installing antivirus software

Performing root cause analysis

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the critical thinking model, what skills do you require to effectively perform particular tasks or functions within cybersecurity?

Administrative skills

Intellectual abilities

Technical skills

Interpersonal skills

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?