Unit 11 C3 - A Cyber Security Plan for a System

Unit 11 C3 - A Cyber Security Plan for a System

12th Grade

10 Qs

quiz-placeholder

Similar activities

Internet security

Internet security

11th - 12th Grade

10 Qs

Cybersecurity

Cybersecurity

12th Grade

10 Qs

S3 Cyber Security Quiz

S3 Cyber Security Quiz

12th Grade

15 Qs

2022 Unit 1 LO2

2022 Unit 1 LO2

12th Grade

15 Qs

23. CompSys - Hardware & Software Quiz

23. CompSys - Hardware & Software Quiz

9th - 12th Grade

11 Qs

ICT

ICT

1st - 12th Grade

15 Qs

Computers Check for Understanding

Computers Check for Understanding

8th - 12th Grade

10 Qs

IC3 GS6 Level 1 Domain 2 Lesson 1

IC3 GS6 Level 1 Domain 2 Lesson 1

6th Grade - University

15 Qs

Unit 11 C3 - A Cyber Security Plan for a System

Unit 11 C3 - A Cyber Security Plan for a System

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Ralph Ellis

Used 25+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are examples of the information required for each protection measure?

Threat(s) addressed by the protection measure

Action(s) to be taken

Reasons for the action(s)

Overview of technical and financial constraints

Overview of legal responsibilities

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Firewalls, routers and wireless access points can be used to support which type of protection method?

Hardware

Software

Physical

Mental

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Firewalls, anti-malware, port scanning and access rights can be used to support which type of protection method?

Hardware

Software

Physical

Mental

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Locks, CCTV, alarm systems and back-ups can be used to support which type of protection method?

Hardware

Software

Physical

Mental

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Used for risks that may be too costly to deal with based on its supposed impact that it is believed to have.

Often threats classified as “Low” risk may be left in this way.

Risk acceptance

Risk avoidance

Risk transfer

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Potential technical and financial constraints might include which of the following?

Difficulties in any technical tasks

Limitations in available hardware or software required

Requirements of staff to perform certain protection measures

Computer Misuse Act

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Potential Cyber Plan action items for network security

Develop strong password policies

Secure and encrypt your company’s Wi-Fi

Set up a spam email filter

Dispose of rubbish securely

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?