ICT14 - Cyber Security

ICT14 - Cyber Security

Professional Development

10 Qs

quiz-placeholder

Similar activities

Sec+ CH.1 Review Test

Sec+ CH.1 Review Test

Professional Development

15 Qs

Monitoring Keamanan Host

Monitoring Keamanan Host

Professional Development

10 Qs

Security+ Study Guide-01 Mastering Security Basics

Security+ Study Guide-01 Mastering Security Basics

Professional Development

15 Qs

OSI Security Architecture

OSI Security Architecture

Professional Development

10 Qs

Security+ Study Guide-10 Understanding Cryptography and PKI

Security+ Study Guide-10 Understanding Cryptography and PKI

Professional Development

15 Qs

Security Issues Of Memory Management In Modern Operating Systems

Security Issues Of Memory Management In Modern Operating Systems

Professional Development

10 Qs

Buzz Word Trivia - Internet of Things (IoT)

Buzz Word Trivia - Internet of Things (IoT)

Professional Development

10 Qs

ICT14 - Cyber Security

ICT14 - Cyber Security

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Lee Smith

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the "CIA" triad in cybersecurity stand for?

Control, Integrity, Access

Confidentiality, Integrity, Availability

Compliance, Investigation, Authentication

Confidentiality, Investigation, Access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of an Intrusion Detection System (IDS)?

Encrypt data

Block malicious traffic

Monitor and alert on suspicious activity

Manage user accounts

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SIEM stand for?

Security Information and Event Management

Secure Internet Email Monitoring

System Integrity and Event Monitoring

Security Intelligence and Emergency Management

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main function of XDR?

Encrypt emails

Provide unified threat detection

Manage user permissions

Block websites

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Shadow IT?

A type of malware

Unauthorised use of IT resources

A backup system

A secure cloud service

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a process control in cybersecurity?

Antivirus software

Incident response plan

Password manager

Encryption tool

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between IDS and IPS?

IDS blocks threats, IPS detects them

IDS detects threats, IPS blocks them

IDS encrypts data, IPS monitors traffic

IDS is manual, IPS is automatic

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?