Cyber Security Plan

Cyber Security Plan

12th Grade

12 Qs

quiz-placeholder

Similar activities

MAIL MERGE

MAIL MERGE

11th - 12th Grade

10 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

1.6 Legal Issues

1.6 Legal Issues

12th Grade

16 Qs

Fundamentals of CS - Legal Considerations

Fundamentals of CS - Legal Considerations

3rd - 12th Grade

10 Qs

Cloud Storage

Cloud Storage

5th - 12th Grade

10 Qs

Computer Misuse Act

Computer Misuse Act

10th - 12th Grade

12 Qs

Ethical, legal, cultural and environmental concerns: GCSE 9-1 Computer Science

Ethical, legal, cultural and environmental concerns: GCSE 9-1 Computer Science

9th - 12th Grade

15 Qs

Data Protection Act 1988

Data Protection Act 1988

6th - 12th Grade

12 Qs

Cyber Security Plan

Cyber Security Plan

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Paul Jenkins

Used 46+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are sections of a cyber security plan?

Threat(s) addressed by the protection measure

Justification of technical responsibilities

Outline cost-benefit

Overview of usability constraints

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following might hardware firewalls be used for?

Detecting malware that has infected a computer.

Scanning ports to see what are open for data to pass through.

Filtering website to prevent accidentally infecting a computer from a web page with malicious code.

Packet filtering to prevent Denial of Service attacks.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

If an organisation uses mobile devices, how might they secure these devices from theft?

Hardware Firewall

Locked Cabinets

Alarm System

Access Rights

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Port scanning can detect open ports that might be a vulnerability in the system.

True

False

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are good techniques for mitigating the level of impact should a malicious user gain access to data?

Access Rights

Network Segmentation

Anti-Malware

Wireless Access Points

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All threats must be protected against, even if they are identified as being low risk.

True

False

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are examples of technical or financial constraints?

Specialist skills needed to perform tasks.

The hardware and software available.

The legislation that must be adhered to.

The performance of the system.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?