
Comp1300 Quiz1

Quiz
•
Information Technology (IT)
•
University
•
Easy
Min You
Used 7+ times
FREE Resource
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following best describes the concept of "Defence in Depth" in cybersecurity?
Using a single, highly secure firewall to protect an organisation
Implementing multiple layers of security controls to mitigate threats
Keeping all software up to date to prevent attacks
Disconnecting critical systems from the internet entirely
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What was the primary cause of the 2020 Toll Group cyberattack?
A phishing email that compromised employee credentials
A denial-of-service (DoS) attack that overwhelmed their servers
An insider threat from a disgruntled employee
A ransomware attack that exploited an unpatched system
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which social engineering attack involves an attacker looking over someone's shoulder to steal information?
Shoulder surfing
Smishing
Dumpster diving
Baiting
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What makes spear phishing different from regular phishing?
It targets a large group of people randomly
It includes fake advertisements to trick users
It is highly targeted towards a specific individual or organisation
It only uses phone calls instead of emails
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is an example of "system hardening"?
Ignoring software updates to maintain compatibility
Disabling unnecessary services and closing unused ports
Using public Wi-Fi to improve accessibility
Storing passwords in a text document for easy access
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
How can an organisation protect itself from smishing attacks?
By training employees not to click on suspicious links in text messages
By installing antivirus software on desktop computers
By setting up a firewall to block suspicious emails
By encrypting all company data
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following best explains the concept of "cyber hygiene"?
Only using security measures when an attack is detected
Installing firewalls and forgetting about security threats
Allowing employees to set their own security protocols
Regularly updating passwords and software to reduce vulnerabilities
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
IS Quiz

Quiz
•
University
15 questions
cybersecurity-common security infrastructure security

Quiz
•
University
15 questions
Huawei Security

Quiz
•
University
10 questions
CHFI Module 1

Quiz
•
University
16 questions
Living in the IT Era: Knowledge Assessment

Quiz
•
University
18 questions
Quiz 02-Finals-IT 222-FIAS

Quiz
•
University
11 questions
QUIZ 3: SECURITY TOOLS and VULNERABILITY ANALYSIS

Quiz
•
University
15 questions
InfoSec Quiz 1

Quiz
•
University
Popular Resources on Wayground
55 questions
CHS Student Handbook 25-26

Quiz
•
9th Grade
10 questions
Afterschool Activities & Sports

Quiz
•
6th - 8th Grade
15 questions
PRIDE

Quiz
•
6th - 8th Grade
15 questions
Cool Tool:Chromebook

Quiz
•
6th - 8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
20 questions
Bullying

Quiz
•
7th Grade
18 questions
7SS - 30a - Budgeting

Quiz
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
36 questions
USCB Policies and Procedures

Quiz
•
University
4 questions
Benefits of Saving

Quiz
•
5th Grade - University
20 questions
Disney Trivia

Quiz
•
University
2 questions
Pronouncing Names Correctly

Quiz
•
University
15 questions
Parts of Speech

Quiz
•
1st Grade - University
1 questions
Savings Questionnaire

Quiz
•
6th Grade - Professio...
26 questions
Parent Functions

Quiz
•
9th Grade - University
18 questions
Parent Functions

Quiz
•
9th Grade - University