23-24 Cybersecurity II S1 Exam Review By Mr B

23-24 Cybersecurity II S1 Exam Review By Mr B

12th Grade

60 Qs

quiz-placeholder

Similar activities

Unit 2 Test Review - The Internet

Unit 2 Test Review - The Internet

9th - 12th Grade

61 Qs

lists and dictionaries  in python smsmb

lists and dictionaries in python smsmb

11th - 12th Grade

60 Qs

Finals in Empowerment Technologies

Finals in Empowerment Technologies

11th - 12th Grade

60 Qs

CIS Microsoft Excel (Review)

CIS Microsoft Excel (Review)

9th Grade - Professional Development

62 Qs

Safety and Security - Easy

Safety and Security - Easy

7th Grade - University

57 Qs

OCR A Level Computer Science - 1.5.x

OCR A Level Computer Science - 1.5.x

12th Grade

65 Qs

Working with Files

Working with Files

8th - 12th Grade

59 Qs

Q1 - Media and Information Literacy 2025-2026

Q1 - Media and Information Literacy 2025-2026

12th Grade

60 Qs

23-24 Cybersecurity II S1 Exam Review By Mr B

23-24 Cybersecurity II S1 Exam Review By Mr B

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Cyber Professor - Mr. B

Used 1+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Anny recently implemented an intrusion prevention system designed to block common network attacks from affecting his organization. What type of risk management strategy is Anny pursuing?

Risk Mitigation

Risk Acceptance

Risk Avoidance

Risk Transference

Answer explanation

Anny is pursuing a risk mitigation strategy by implementing an intrusion prevention system to block network attacks.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following principles expects an individual to behave reasonably under any given circumstance?

Due Care

Due Diligence

Separation of Duties

Least Privilege

Answer explanation

Due Care expects an individual to behave reasonably under any given circumstance.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of malware is characterized by spreading from system to system under its own power by exploiting vulnerabilities that do not require user intervention?

Worm

Trojan Horse

Virus

Logic Bomb

Answer explanation

A worm is a type of malware that spreads from system to system without user intervention by exploiting vulnerabilities. It is the correct choice because it spreads autonomously.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following security programs is designed to establish a minimum standard common denominator of security understanding?

Awareness

Training

Education

Indoctrination

Answer explanation

Awareness is a security program that establishes a minimum standard of security understanding. It promotes knowledge and highlights the correct choice.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is an example of physical infrastructure hardening?

Fire Suppression System

Two Factor-Authentication

Hardware-based Network Firewall

Antivirus Software

Answer explanation

Physical infrastructure hardening includes measures such as installing fire suppression systems to protect against fire hazards.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which information security goal is impacted when an organization experiences a DoS or DDoS attack?

Integrity

Confidentiality

Availability

Authenticity

Answer explanation

A DoS or DDoS attack impacts the availability of an organization's systems, making them inaccessible to users.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

 What is the best way to provide accountability for the use of identities?

Logging

Authorization

Digital Signatures

Type 1 Authentication

Answer explanation

Logging is the best way to provide accountability for the use of identities. It allows tracking and auditing of identity-related activities, ensuring transparency and accountability.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?