ICT 3 INFORMATION ASSURANCE AND SECURITY

ICT 3 INFORMATION ASSURANCE AND SECURITY

University

10 Qs

quiz-placeholder

Similar activities

Topic 4 - Understanding System Vulnerabilities

Topic 4 - Understanding System Vulnerabilities

12th Grade - University

15 Qs

Cybersecurity

Cybersecurity

University

12 Qs

Mastering Physical Security Concepts

Mastering Physical Security Concepts

12th Grade - University

15 Qs

SAN Module 5 Quiz

SAN Module 5 Quiz

University - Professional Development

15 Qs

Software Defined Networking

Software Defined Networking

University

10 Qs

Cisco Switch Security

Cisco Switch Security

University

10 Qs

CN3303 - Lecture 9: Cloud Security threats

CN3303 - Lecture 9: Cloud Security threats

University

10 Qs

APi Security webinar

APi Security webinar

University

10 Qs

ICT 3 INFORMATION ASSURANCE AND SECURITY

ICT 3 INFORMATION ASSURANCE AND SECURITY

Assessment

Quiz

Computers

University

Easy

Created by

Xanon Adovas

Used 44+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

IDENTIFY WHAT ARE THESE THINGS

MALWARE, SOCIAL ENGINEERING, INSIDER THREATS, NETWORK BASE ATTACKS. PHYSICAL THREATS

ACCESS CONTROLS

ENCRYPTION

TYPES OF THREATS

SECURITY ACCESS

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

IT IS THE DIVISION OF NETWORKS INTO A SMALLER PARTS TO MAKE IT MORE SECURE

NETWORK ANALYTICS

DATA REFERENCE

DATA STRUCTURE

NETWORK SEGMENTATION

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When something happens to a company in case of data breach, this things should be follow and observe

Incident response plan

Security Plan

Data Breach Plan

Access Control Plan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As a security specialist, this type of app can help you or assist you in taking control from malware and other similar malicious files

Firewalls

Antivirus

Encryption

Digital Certificate

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TSUBASA WORKS IN AN IT COMPANY, AND HOLDING 1 OF THE 2 KEY FOR ACCESS, FOR DECRYPTING AND ENCRYPTING. WHAT KIND OF ENCRYPTION IS THIS

ASSYMETRIC ENCRYPTION

SYMMETRIC ENCRYPTION

ACCESS ENCRYPTION

NUMBER 3 ENCRYPTION

6.

FILL IN THE BLANK QUESTION

20 sec • 1 pt

This danger can harm tangible assets, what is it?

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

This type of attack takes control to a large number of computers and use it for his own attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?