Introduction to Cybersecurity

Introduction to Cybersecurity

Professional Development

20 Qs

quiz-placeholder

Similar activities

Sec+ CH.1 Review Test

Sec+ CH.1 Review Test

Professional Development

15 Qs

Cryptography Chap-1

Cryptography Chap-1

9th Grade - Professional Development

15 Qs

CompTIA Security+ Certification Exam SY0-701 Practice Test 1

CompTIA Security+ Certification Exam SY0-701 Practice Test 1

Professional Development

25 Qs

Quiz on Operating System Services

Quiz on Operating System Services

Professional Development

15 Qs

Chapter 3 Quiz

Chapter 3 Quiz

Professional Development

20 Qs

A+ - 18C - Troubleshoot Mobile OS and App Security

A+ - 18C - Troubleshoot Mobile OS and App Security

Professional Development

23 Qs

City & Guilds Level 3 Apprenticeship Coding and Logic

City & Guilds Level 3 Apprenticeship Coding and Logic

Professional Development

20 Qs

AI Cybersecurity Quiz

AI Cybersecurity Quiz

Professional Development

15 Qs

Introduction to Cybersecurity

Introduction to Cybersecurity

Assessment

Quiz

Computers, Special Education, Life Skills

Professional Development

Hard

Created by

Shadab Sheikh

Used 39+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Anny recently implemented an intrusion prevention system designed to block common network attacks from affecting his organization. What type of risk management strategy is Anny pursuing?

Risk Acceptance

Risk Avoidance

Risk Mitigation

Risk Transference

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following principles expects an individual to behave reasonably under any given circumstance?

Due Diligence

Separation of Duties

Due Care

Least Privilege

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of malware is characterized by spreading from system to system under its own power by exploiting vulnerabilities that do not require user intervention?

Trojan Horse

Virus

Logic Bomb

Worm

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following security programs is designed to establish a minimum standard common denominator of security understanding?

Training

Education

Indoctrination

Awareness

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is an example of physical infrastructure hardening?

Antivirus Software

Hardware-based Network Firewall

Two Factor-Authentication

Fire Suppression System

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which information security goal is impacted when an organization experiences a DoS or DDoS attack?

Confidentiality

Integrity

Availability

Denial

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the best way to provide accountability for the use of identities?

Logging

Authorization

Digital Signatures

Type 1 Authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?