WIX3003 Technical Security Management

WIX3003 Technical Security Management

5th Grade

20 Qs

quiz-placeholder

Similar activities

Pyhton Input and Output Basics

Pyhton Input and Output Basics

5th Grade

20 Qs

Doc Quiz

Doc Quiz

2nd - 6th Grade

20 Qs

Pivot stick figure exercises - Class 2&3

Pivot stick figure exercises - Class 2&3

2nd - 5th Grade

25 Qs

Introduction to Scratch

Introduction to Scratch

3rd - 5th Grade

15 Qs

Files and Documents Computer Basics

Files and Documents Computer Basics

KG - 8th Grade

15 Qs

File Management

File Management

5th - 12th Grade

16 Qs

PSAS Komputer

PSAS Komputer

1st - 5th Grade

19 Qs

empowerment quiz2

empowerment quiz2

1st - 5th Grade

20 Qs

WIX3003 Technical Security Management

WIX3003 Technical Security Management

Assessment

Quiz

Computers

5th Grade

Practice Problem

Medium

Created by

Muhammad Z'aba

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

0 sec • 1 pt

Which of the following are examples of technical security controls?

intrusion detection system

encryption policy

encryption

security lighting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Countermeasures used to avoid security risks are a preventive type of security control

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Countermeasures used to detect security risks are a detective type of security control

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Countermeasures used to counteract security risks are a corrective type of security control

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Updating Windows to the latest security updates is an example of a corrective type of security control

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to NIST SP800-83, malware is a program that is overtly inserted into another program

Of course my dear

Wrong!

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A backdoor that is present in a computer may allow an attacker to install keylogger programs

Yes, probably

This is fake news!!

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?