My Quiz

My Quiz

Professional Development

11 Qs

quiz-placeholder

Similar activities

 BSBXC402 - S2 Spam Prevention Quiz

BSBXC402 - S2 Spam Prevention Quiz

Professional Development

8 Qs

R&D Days

R&D Days

Professional Development

15 Qs

MS900 - Module 4 - Full Quiz

MS900 - Module 4 - Full Quiz

Professional Development

15 Qs

Content Collaboration and IT Security Awareness

Content Collaboration and IT Security Awareness

Professional Development

6 Qs

Cyber 1 Modules 13, 14, 15, 16

Cyber 1 Modules 13, 14, 15, 16

9th Grade - Professional Development

15 Qs

Kuis Keamanan Siber

Kuis Keamanan Siber

Professional Development

10 Qs

KPI Advanced

KPI Advanced

Professional Development

15 Qs

Digital Investigation Quiz

Digital Investigation Quiz

Professional Development

10 Qs

My Quiz

My Quiz

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Hasit Mankad

Used 1+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Who is responsible for Cyber Security?

Technology Information Security Office

Developers

Government

Everyone

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When receiving an email from an unknown contact that has a link, you should?

Open the link to view its contents

Report the suspicious email to TISO

Forward the email to your co-workers to allow them to open the link first

Forward the email to your personal email account so you can open it at home

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does social engineering mean in a security context?

Building secure systems that are easy to use for society

It is a form of social deception focused on information gathering, fraud, or system access.

It is a Honeypot


All of the above

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The other day you were watching the news and you heard a journalist talking about a of cyber-threat. Essentially criminals seem to be able to use malicious software to restrict users from accessing their computer system or personal files. Later criminals demand a payment in order for the restriction to be removed. What is the name of this threat?


Ransomware

Botnet


Virus

Trojan

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What facet of cloud computing helps to guard against downtime and determines costs?

Service-level agreements

Bandwidth fees

Application programming interfaces

Virtual private networks

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Virtual Machine Ware (VMware) is an example of

Infrastructure Service

Software Service

Platform Service

Security Service

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which is considered the most widely used cloudcomputing service?

Infrastructure-as-a-Service (IaaS)

Platform-as-a-Service (PaaS)

Communication-as-a-Service (CaaS)

Software-as-a-Service (SaaS)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?