CYBER SECURITY

CYBER SECURITY

Professional Development

18 Qs

quiz-placeholder

Similar activities

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

Teaching Strategy

Teaching Strategy

Professional Development

20 Qs

IT (data, viruses and more)

IT (data, viruses and more)

8th Grade - Professional Development

20 Qs

Evaluación de Resultados - JUNIO 2024

Evaluación de Resultados - JUNIO 2024

Professional Development

14 Qs

UJIAN SEMESTER II :  KKPI (TAHUN 2019-2020)

UJIAN SEMESTER II : KKPI (TAHUN 2019-2020)

Professional Development

20 Qs

PRUEBA DEL RA6

PRUEBA DEL RA6

Professional Development

20 Qs

Evaluacion Continua 02 - Enero 2024

Evaluacion Continua 02 - Enero 2024

Professional Development

16 Qs

Révision HTML, CSS et JavaScript

Révision HTML, CSS et JavaScript

Professional Development

20 Qs

CYBER SECURITY

CYBER SECURITY

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

Felix M.

Used 34+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

Is Importance of Risk Management in Information Security typically defined as the process of identifying, analyzing, and responding to risks.

This process is not meant to end; as long as information exists, it will need protecting.

TRUE

FALSE

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

1.      What are the most popular targets in the current threat landscape?

 

i. Computing and power resources

ii. Financial information

iii. Account information

iv. National security data

SELECT THE BEST ANSWER FOR THE QUESTION ABOVE

A. i, ii & iii

B. i & iii

C. ii & iv

D. i, ii, iii & iv

3.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

1.      The Latest Threats and Exploits goes through a rigorous testing process as they grow and are developed?

TRUE

FALSE

4.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

PILIH CIRI - CIRI THREAT ACTOR.

A. Hired Hacker

B. Insider

C. Outsider

D. CyberSecurity

5.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Analysis Method exist because it's impossible for a purely quantitative risk assessment to exist given that some issues defy number.

STATMENT YANG DI ATAS ADALAH? B. Quantitative (C)

A. Qualitative

B. Quantitative

C. Quantitative

6.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

3. Pick 1 security control categories

A. Technical

B. System

C. Security base

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What would you do if you faced a problem that is beyond your expertise?

A. Transfer it to someone who knows more about it.

B. Ignore the difficulty and accept it knowing there will be a consequences

C. Avoid the problem and pretend something didn't happen

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?