23-24 Cybersecurity II S1 Exam Review By Mr B

23-24 Cybersecurity II S1 Exam Review By Mr B

12th Grade

60 Qs

quiz-placeholder

Similar activities

AQA Computer Science GCSE - 3.4 Computer systems

AQA Computer Science GCSE - 3.4 Computer systems

10th - 12th Grade

63 Qs

Excel Review

Excel Review

9th - 12th Grade

62 Qs

Microsoft Word/Powerpoint M1:L1-6

Microsoft Word/Powerpoint M1:L1-6

9th - 12th Grade

60 Qs

CSEC IT- Past Paper MCQ- 2020

CSEC IT- Past Paper MCQ- 2020

12th Grade

60 Qs

TryOut UP TKI Angkatan 3

TryOut UP TKI Angkatan 3

10th - 12th Grade

60 Qs

MIL for Completion

MIL for Completion

12th Grade

60 Qs

SAINS KOMPUTER TING 4 - 1.2 ALGORITMA

SAINS KOMPUTER TING 4 - 1.2 ALGORITMA

12th Grade - University

62 Qs

Python - 5.பைத்தான் அறிமுகம் – மாறிகள் மற்றும் செயற்குறிகள்

Python - 5.பைத்தான் அறிமுகம் – மாறிகள் மற்றும் செயற்குறிகள்

12th Grade

65 Qs

23-24 Cybersecurity II S1 Exam Review By Mr B

23-24 Cybersecurity II S1 Exam Review By Mr B

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

Created by

Cyber Professor - Mr. B

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Anny recently implemented an intrusion prevention system designed to block common network attacks from affecting his organization. What type of risk management strategy is Anny pursuing?

Risk Mitigation

Risk Acceptance

Risk Avoidance

Risk Transference

Answer explanation

Anny is pursuing a risk mitigation strategy by implementing an intrusion prevention system to block network attacks.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following principles expects an individual to behave reasonably under any given circumstance?

Due Care

Due Diligence

Separation of Duties

Least Privilege

Answer explanation

Due Care expects an individual to behave reasonably under any given circumstance.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of malware is characterized by spreading from system to system under its own power by exploiting vulnerabilities that do not require user intervention?

Worm

Trojan Horse

Virus

Logic Bomb

Answer explanation

A worm is a type of malware that spreads from system to system without user intervention by exploiting vulnerabilities. It is the correct choice because it spreads autonomously.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following security programs is designed to establish a minimum standard common denominator of security understanding?

Awareness

Training

Education

Indoctrination

Answer explanation

Awareness is a security program that establishes a minimum standard of security understanding. It promotes knowledge and highlights the correct choice.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is an example of physical infrastructure hardening?

Fire Suppression System

Two Factor-Authentication

Hardware-based Network Firewall

Antivirus Software

Answer explanation

Physical infrastructure hardening includes measures such as installing fire suppression systems to protect against fire hazards.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which information security goal is impacted when an organization experiences a DoS or DDoS attack?

Integrity

Confidentiality

Availability

Authenticity

Answer explanation

A DoS or DDoS attack impacts the availability of an organization's systems, making them inaccessible to users.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

 What is the best way to provide accountability for the use of identities?

Logging

Authorization

Digital Signatures

Type 1 Authentication

Answer explanation

Logging is the best way to provide accountability for the use of identities. It allows tracking and auditing of identity-related activities, ensuring transparency and accountability.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?