ICT 3 INFORMATION ASSURANCE AND SECURITY

ICT 3 INFORMATION ASSURANCE AND SECURITY

University

10 Qs

quiz-placeholder

Similar activities

Data Security Worksheet

Data Security Worksheet

10th Grade - University

15 Qs

Topic 4 - Understanding System Vulnerabilities

Topic 4 - Understanding System Vulnerabilities

12th Grade - University

15 Qs

CN3303 - Lecture 9: Cloud Security threats

CN3303 - Lecture 9: Cloud Security threats

University

10 Qs

Information Security Principles

Information Security Principles

University

10 Qs

Hacking Scenarios

Hacking Scenarios

University

12 Qs

L8: Network security Defence in Depth

L8: Network security Defence in Depth

University

10 Qs

1.1.11 Causes of data loss

1.1.11 Causes of data loss

11th Grade - University

10 Qs

CN3303 Lecture 3 Business Risk and Continuity

CN3303 Lecture 3 Business Risk and Continuity

University

10 Qs

ICT 3 INFORMATION ASSURANCE AND SECURITY

ICT 3 INFORMATION ASSURANCE AND SECURITY

Assessment

Quiz

Computers

University

Easy

Created by

Xanon Adovas

Used 44+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

IDENTIFY WHAT ARE THESE THINGS

MALWARE, SOCIAL ENGINEERING, INSIDER THREATS, NETWORK BASE ATTACKS. PHYSICAL THREATS

ACCESS CONTROLS

ENCRYPTION

TYPES OF THREATS

SECURITY ACCESS

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

IT IS THE DIVISION OF NETWORKS INTO A SMALLER PARTS TO MAKE IT MORE SECURE

NETWORK ANALYTICS

DATA REFERENCE

DATA STRUCTURE

NETWORK SEGMENTATION

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When something happens to a company in case of data breach, this things should be follow and observe

Incident response plan

Security Plan

Data Breach Plan

Access Control Plan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As a security specialist, this type of app can help you or assist you in taking control from malware and other similar malicious files

Firewalls

Antivirus

Encryption

Digital Certificate

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TSUBASA WORKS IN AN IT COMPANY, AND HOLDING 1 OF THE 2 KEY FOR ACCESS, FOR DECRYPTING AND ENCRYPTING. WHAT KIND OF ENCRYPTION IS THIS

ASSYMETRIC ENCRYPTION

SYMMETRIC ENCRYPTION

ACCESS ENCRYPTION

NUMBER 3 ENCRYPTION

6.

FILL IN THE BLANK QUESTION

20 sec • 1 pt

This danger can harm tangible assets, what is it?

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

This type of attack takes control to a large number of computers and use it for his own attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?