INFOASSURANCE

INFOASSURANCE

University

10 Qs

quiz-placeholder

Similar activities

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Cybersecurity

Cybersecurity

University

11 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

CSE_Chap1

CSE_Chap1

University

10 Qs

Hacking

Hacking

University

12 Qs

Teacher Camp 7/11

Teacher Camp 7/11

University

10 Qs

QuizChapter2

QuizChapter2

University

11 Qs

305 - DAY 5

305 - DAY 5

University

13 Qs

INFOASSURANCE

INFOASSURANCE

Assessment

Quiz

Computers

University

Medium

Created by

Rexiecats Rexiecats

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 4 pts

This layer of cybersecurity ensures that _______ have strategies in place to proactively prevent and to respond quickly and effectively in the event of a cybersecurity incident

2.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

are a type of malware that, once activated, grants hackers control over the infected computer. The attacker can then proceed with stealing data from the machine, rendering it inoperable, and using the camera

remote administrative tools

remote administration tools

remote administrating tools

remote malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

Hackers proceed to hiding their _____ to mask the origins of the attack.

pants

shorts

tracks

track

4.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

Employees can ​create some of the _____ _____ to cybersecurity.

most threat

greatest risks

reduced

least risks

increase

5.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

Deep learning encompasses some technologies like machine learning and __________.

Deep web

Robotics

Information Technology

Artificial Intelligence

6.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

Hardware authentication is a well-known fact that a majority of data users’ passwords and usernames are weak.

False

True

Not sure

No correct answer

7.

FILL IN THE BLANK QUESTION

30 sec • 4 pts

A ______ is a set of rules that appliesto activities for the computer and communications resources that belong to an organization.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?