Cyber Security Plan

Cyber Security Plan

12th Grade

12 Qs

quiz-placeholder

Similar activities

Basics of spreadsheet

Basics of spreadsheet

12th Grade

15 Qs

Stepwise Refinement

Stepwise Refinement

11th - 12th Grade

13 Qs

MEDIA AND INFORMATION LITERACY

MEDIA AND INFORMATION LITERACY

12th Grade

10 Qs

To Change or Not to Change?

To Change or Not to Change?

12th Grade

10 Qs

Python List

Python List

4th Grade - University

15 Qs

Threats to Data

Threats to Data

9th - 12th Grade

11 Qs

1.1.1 The structure and function of the processor

1.1.1 The structure and function of the processor

11th Grade - University

15 Qs

COMPUTER PROGRAMMING Q2_FLOWCHART (2 points each)

COMPUTER PROGRAMMING Q2_FLOWCHART (2 points each)

11th - 12th Grade

10 Qs

Cyber Security Plan

Cyber Security Plan

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

Created by

Paul Jenkins

Used 46+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are sections of a cyber security plan?

Threat(s) addressed by the protection measure

Justification of technical responsibilities

Outline cost-benefit

Overview of usability constraints

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following might hardware firewalls be used for?

Detecting malware that has infected a computer.

Scanning ports to see what are open for data to pass through.

Filtering website to prevent accidentally infecting a computer from a web page with malicious code.

Packet filtering to prevent Denial of Service attacks.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

If an organisation uses mobile devices, how might they secure these devices from theft?

Hardware Firewall

Locked Cabinets

Alarm System

Access Rights

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Port scanning can detect open ports that might be a vulnerability in the system.

True

False

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are good techniques for mitigating the level of impact should a malicious user gain access to data?

Access Rights

Network Segmentation

Anti-Malware

Wireless Access Points

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All threats must be protected against, even if they are identified as being low risk.

True

False

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are examples of technical or financial constraints?

Specialist skills needed to perform tasks.

The hardware and software available.

The legislation that must be adhered to.

The performance of the system.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?