Cyber security

Cyber security

University

10 Qs

quiz-placeholder

Similar activities

History of Chinese Architecture

History of Chinese Architecture

University

10 Qs

Pursuit of Happyness

Pursuit of Happyness

University

10 Qs

Going Online- Test 3B-Yr6

Going Online- Test 3B-Yr6

4th Grade - University

10 Qs

Disney Movie Trivia

Disney Movie Trivia

KG - University

14 Qs

Board Game Trivia!

Board Game Trivia!

5th Grade - University

13 Qs

Tipos de contraste

Tipos de contraste

University

10 Qs

Famous Paintings

Famous Paintings

9th Grade - University

10 Qs

Trade blocs

Trade blocs

University

15 Qs

Cyber security

Cyber security

Assessment

Quiz

Arts

University

Hard

Created by

Alif Qayyum

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is called the collective terms of malicious software such as viruses, worms and trojans ?

spam

phishing

malware

worm

2.

MULTIPLE CHOICE QUESTION

20 sec • 2 pts

Which of the following incident response steps involves actions to protect critical systems while maintaining business operations ?

investigation

containment

recovery

lessons learned

3.

MULTIPLE SELECT QUESTION

20 sec • 2 pts

A network administrator needs to build out a new datacenter, with a focus on resiliency and uptime. Which of the following would BEST meet this objective? Choose two

Dual power supply

Off-site backups.

Automatic OS upgrades

NIC teaming.

4.

MULTIPLE CHOICE QUESTION

20 sec • 2 pts

Which of the following cloud models provides clients with servers, storage, and networks but nothing else?

SaaS

PaaS

IaaS

DaaS

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An organization is developing a plan in the event of a complete loss of critical systems and data. Which of the following plans is the organization MOST likely developing?

Incident response

Communications

Data retention

Disaster recovery

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which of the following risk management strategies would cybersecurity insurance be used?

Avoidance

Transference

Acceptance

Mitigation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices. Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company's data?

Containerization

Geofencing

Full-disk encryption

Remote wipe

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?