
Comp1300 Quiz1
Authored by Min You
Information Technology (IT)
University
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following best describes the concept of "Defence in Depth" in cybersecurity?
Using a single, highly secure firewall to protect an organisation
Implementing multiple layers of security controls to mitigate threats
Keeping all software up to date to prevent attacks
Disconnecting critical systems from the internet entirely
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What was the primary cause of the 2020 Toll Group cyberattack?
A phishing email that compromised employee credentials
A denial-of-service (DoS) attack that overwhelmed their servers
An insider threat from a disgruntled employee
A ransomware attack that exploited an unpatched system
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which social engineering attack involves an attacker looking over someone's shoulder to steal information?
Shoulder surfing
Smishing
Dumpster diving
Baiting
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What makes spear phishing different from regular phishing?
It targets a large group of people randomly
It includes fake advertisements to trick users
It is highly targeted towards a specific individual or organisation
It only uses phone calls instead of emails
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is an example of "system hardening"?
Ignoring software updates to maintain compatibility
Disabling unnecessary services and closing unused ports
Using public Wi-Fi to improve accessibility
Storing passwords in a text document for easy access
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
How can an organisation protect itself from smishing attacks?
By training employees not to click on suspicious links in text messages
By installing antivirus software on desktop computers
By setting up a firewall to block suspicious emails
By encrypting all company data
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following best explains the concept of "cyber hygiene"?
Only using security measures when an attack is detected
Installing firewalls and forgetting about security threats
Allowing employees to set their own security protocols
Regularly updating passwords and software to reduce vulnerabilities
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?