23-24 Cybersecurity II S1 Exam Review By Mr B

23-24 Cybersecurity II S1 Exam Review By Mr B

12th Grade

60 Qs

quiz-placeholder

Similar activities

Module 5 Test Review

Module 5 Test Review

7th - 12th Grade

56 Qs

MTA Mobility and Devices

MTA Mobility and Devices

9th - 12th Grade

57 Qs

Cyber Science Senior Final Test

Cyber Science Senior Final Test

12th Grade

60 Qs

IST Final Exam Review Tindall

IST Final Exam Review Tindall

9th Grade - University

63 Qs

4th Six Weeks Review

4th Six Weeks Review

9th - 12th Grade

56 Qs

CBT Practice Questions - Set 5

CBT Practice Questions - Set 5

12th Grade

60 Qs

Computer Awareness - 8

Computer Awareness - 8

12th Grade

60 Qs

ICDL | CYBER SECURITY

ICDL | CYBER SECURITY

12th Grade

62 Qs

23-24 Cybersecurity II S1 Exam Review By Mr B

23-24 Cybersecurity II S1 Exam Review By Mr B

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Cyber Professor - Mr. B

Used 1+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Anny recently implemented an intrusion prevention system designed to block common network attacks from affecting his organization. What type of risk management strategy is Anny pursuing?

Risk Mitigation

Risk Acceptance

Risk Avoidance

Risk Transference

Answer explanation

Anny is pursuing a risk mitigation strategy by implementing an intrusion prevention system to block network attacks.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following principles expects an individual to behave reasonably under any given circumstance?

Due Care

Due Diligence

Separation of Duties

Least Privilege

Answer explanation

Due Care expects an individual to behave reasonably under any given circumstance.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of malware is characterized by spreading from system to system under its own power by exploiting vulnerabilities that do not require user intervention?

Worm

Trojan Horse

Virus

Logic Bomb

Answer explanation

A worm is a type of malware that spreads from system to system without user intervention by exploiting vulnerabilities. It is the correct choice because it spreads autonomously.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following security programs is designed to establish a minimum standard common denominator of security understanding?

Awareness

Training

Education

Indoctrination

Answer explanation

Awareness is a security program that establishes a minimum standard of security understanding. It promotes knowledge and highlights the correct choice.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is an example of physical infrastructure hardening?

Fire Suppression System

Two Factor-Authentication

Hardware-based Network Firewall

Antivirus Software

Answer explanation

Physical infrastructure hardening includes measures such as installing fire suppression systems to protect against fire hazards.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which information security goal is impacted when an organization experiences a DoS or DDoS attack?

Integrity

Confidentiality

Availability

Authenticity

Answer explanation

A DoS or DDoS attack impacts the availability of an organization's systems, making them inaccessible to users.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

 What is the best way to provide accountability for the use of identities?

Logging

Authorization

Digital Signatures

Type 1 Authentication

Answer explanation

Logging is the best way to provide accountability for the use of identities. It allows tracking and auditing of identity-related activities, ensuring transparency and accountability.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?