MAF682 TECHNOLOGY AND CYBER RISKS

MAF682 TECHNOLOGY AND CYBER RISKS

University

10 Qs

quiz-placeholder

Similar activities

TEST LEVEL ICT ANDA

TEST LEVEL ICT ANDA

University

15 Qs

Exploring Informatics and Computational Thinking

Exploring Informatics and Computational Thinking

8th Grade - University

10 Qs

Risk Management: Credit risk and Market risk

Risk Management: Credit risk and Market risk

University

10 Qs

Transportation trends

Transportation trends

University

10 Qs

Qualitative Analysis

Qualitative Analysis

University

10 Qs

Cloud Computing

Cloud Computing

University

10 Qs

Theories of Globalization

Theories of Globalization

University

11 Qs

QUIZ: SOCIAL MEDIA PRIVACY PROTECTION POLICIES IN THE PH

QUIZ: SOCIAL MEDIA PRIVACY PROTECTION POLICIES IN THE PH

University

10 Qs

MAF682 TECHNOLOGY AND CYBER RISKS

MAF682 TECHNOLOGY AND CYBER RISKS

Assessment

Quiz

Other

University

Hard

Created by

Nurathirah Zamri

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

10 sec • 1 pt

Technology risk is a _______ risk like other type of risks, therefore it creates both threats as well as opportunities for organizations

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which is NOT the way to mitigate the technology risk?

Secure Endpoint

Reinforce Network Infrastructure

Monitor And Analyze Security Threats Continuously

Analyze fraud detection and deterrence

3.

MULTIPLE SELECT QUESTION

10 sec • 1 pt

What is the potential impact of technology failure or breach?

Financial Losses

Data Exposure

Operational Disruption

Insurance Costs

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Misconfigured security settings, accidental data exposure, or improper handling of sensitive information.

These are the example of __________

Human error

Third - party risks

Cybersecurity threats

Hardware failures

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is an example of a cyber risk source that organizations need to be vigilant about?

A) Natural disasters B) Insider threats C) Competition from other businesses D) Regulatory compliance

Please select the correct option (A, B, C, or D) that best represents a cyber risk source.

A

B

C

D

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is a "phishing" attack typically designed to do?

A) Install antivirus software on the victim's computer

B) Gain unauthorized access to a network

C) Trick individuals into revealing sensitive information

D) Encrypt the victim's data

D

B

A

C

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the main purpose of a firewall in a network security context?

To steal sensitive data

To disrupt or overload a target's services

To deface a website

To block unwanted network traffic and protect against unauthorized access

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?