Cybersecurity 104

Cybersecurity 104

University

30 Qs

quiz-placeholder

Similar activities

2ª ATIVIDADE DE REVISÃO DE SEGURANÇA DA INFORMAÇÃO - 3ª NOTA

2ª ATIVIDADE DE REVISÃO DE SEGURANÇA DA INFORMAÇÃO - 3ª NOTA

University

25 Qs

IT 402 - Quiz 1

IT 402 - Quiz 1

University

25 Qs

RA 9418

RA 9418

University

25 Qs

Tổ chức thông tin trên internet_lớp 9

Tổ chức thông tin trên internet_lớp 9

12th Grade - University

25 Qs

Thyristors

Thyristors

University

25 Qs

Grade 7 IA Q4Week3 Test

Grade 7 IA Q4Week3 Test

7th Grade - University

25 Qs

BMM Kelas H

BMM Kelas H

University

25 Qs

Revisão M2 - ADS - B

Revisão M2 - ADS - B

University

25 Qs

Cybersecurity 104

Cybersecurity 104

Assessment

Quiz

Instructional Technology

University

Practice Problem

Medium

Created by

Paul Pesce

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A targeted email attack sent to Sara, the company's Chief Executive Officer (CEO), is known as which of the following?

Whaling

Bluesnarfing

Vishing

Dumpster diving

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Employee badges are encoded with a private encryption key and specific personal information. The encoding is then used to provide access to the network. Which of the following describes this access control type?

Smartcard

Token

Discretionary access control

Mandatory access control

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator is observing congestion on the firewall interfaces and a high number of half open incoming connections from different external IP addresses. Which of the following attack types is underway?

Cross-site scripting

SPIM

Client-side

DDoS

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee is granted access to only areas of a network folder needed to perform their job. Which of the following describes this form of access control?

Separation of duties

Time of day restrictions

Implicit deny

Least privilege

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A username provides which of the following?

Biometrics

Identification

Authorization

Authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator has just finished creating a hot site for the company. This implementation relates to which of the following concepts?

Confidentiality

Succession planning

Integrity

Availability

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of multifactor authentication?

Credit card and PIN

Username and password

Password and PIN

Fingerprint and retina scan

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology