INFOASSURANCE

INFOASSURANCE

University

10 Qs

quiz-placeholder

Similar activities

Kuis soal KD 3.4 Remote Server

Kuis soal KD 3.4 Remote Server

10th Grade - University

10 Qs

itappC03 finex q1

itappC03 finex q1

University

15 Qs

ICDL Cyber Security

ICDL Cyber Security

University

14 Qs

Intro to Networking-Protocols and Models

Intro to Networking-Protocols and Models

9th Grade - University

9 Qs

Introduction to Cybersecurity

Introduction to Cybersecurity

9th Grade - University

10 Qs

Github Quiz

Github Quiz

University

10 Qs

boost up your mind

boost up your mind

5th Grade - University

15 Qs

Cyber Security QUIZ

Cyber Security QUIZ

University

10 Qs

INFOASSURANCE

INFOASSURANCE

Assessment

Quiz

Computers

University

Medium

Created by

Rexiecats Rexiecats

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 4 pts

This layer of cybersecurity ensures that _______ have strategies in place to proactively prevent and to respond quickly and effectively in the event of a cybersecurity incident

2.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

are a type of malware that, once activated, grants hackers control over the infected computer. The attacker can then proceed with stealing data from the machine, rendering it inoperable, and using the camera

remote administrative tools

remote administration tools

remote administrating tools

remote malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

Hackers proceed to hiding their _____ to mask the origins of the attack.

pants

shorts

tracks

track

4.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

Employees can ​create some of the _____ _____ to cybersecurity.

most threat

greatest risks

reduced

least risks

increase

5.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

Deep learning encompasses some technologies like machine learning and __________.

Deep web

Robotics

Information Technology

Artificial Intelligence

6.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

Hardware authentication is a well-known fact that a majority of data users’ passwords and usernames are weak.

False

True

Not sure

No correct answer

7.

FILL IN THE BLANK QUESTION

30 sec • 4 pts

A ______ is a set of rules that appliesto activities for the computer and communications resources that belong to an organization.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?