
Cybersecurity
Quiz
•
Computers
•
University
•
Hard
Malena Prinzing
Used 5+ times
FREE Resource
22 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
The deactivation of access to corporate systems and documents after an employee leaves a company is an example of which tool that ensures confidentiality? More than one answer may be correct.
access control
physical security
encryption
authentication
Answer explanation
Ensuring that former employees no longer have access to corporate materials is one way to maintain confidentiality. Access control ensures that the correct people will have access to confidential materials, while authentication validates a user to confirm that they should have access to such confidential materials.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Where are data in transit found?
in the cloud
on a cellular network
on a hard drive
on a smart appliance
Answer explanation
Data in transit is data that is moving between devices; therefore, data transmitted through a cellular network are considered data in transit.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?
prevent technology disruptions from occurring
conduct regular backups of data
outline specific recovery times for information technology to resume after an issue occurs
allow normal business operations to continue as soon as possible after an issue occurs
Answer explanation
The goal of an information technology disaster recovery plan (IT DRP) is to resume technological functions, not just general business functions, as soon as possible after an issue occurs. Outlining expected recovery times for IT to resume is one item that should be part of all IT DRPs.
4.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Describe steps in cybersecurity risk analysis. More than one answer may be correct.
estimate potential losses
assign value to assets
estimate the likelihood of occurrence of threats
train employees on cybersecurity
Answer explanation
The first step in a risk analysis is identification and valuation of an organization’s information assets. The second step is to estimate potential costs and losses per security incident, which include costs of malware attacks, fees and penalties associated with data breaches, and lost revenue. It is important to understand the probability of each type of security threat.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What does the identify (ID) function of the NIST Cybersecurity Framework focus on?
organizational implementation of an action plan in the event of a cybersecurity breach
organizational development of a plan of restoration in the event of a cybersecurity breach
organizational detection of cybersecurity events in a timely fashion
organizational understanding of how to manage cybersecurity risks
Answer explanation
The identify (ID) function aims to create an organizational awareness of associated risks in the context of their business and resources.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Why is a denial-of-service attack (DoS attack) a threat to data availability?
A DoS attack floods a system with incoming messages designed to trick an unsuspecting employee into granting unauthorized access to data
A DoS attack changes the data that is stored on the server, rendering it inaccurate
DoS attacks remove any encryptions that are placed around data, making them available without proper authentication
By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it
Answer explanation
In a DoS attack, a system is flooded with incoming messages. This creates a bandwidth problem for the system, forcing it to shut down, making the data inaccessible to those who legitimately have access to it.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the NIST Cybersecurity Framework functions investigates an organization’s cybersecurity management in the context of their business needs and resources?
recover (RC) function
detect (DE) function
identify (ID) function
protect (PR) function
Answer explanation
The ID function, the first of five in the framework, helps organizations better understand efforts needed to manage risks specific to their IT infrastructures.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
20 questions
Data Structure
Quiz
•
University
20 questions
DBMS LAB
Quiz
•
University
20 questions
Database
Quiz
•
12th Grade - University
19 questions
computer storage
Quiz
•
University
20 questions
Understanding Computer Hardware
Quiz
•
8th Grade - University
20 questions
KHS CompTIA Fundamentals: Domain 5
Quiz
•
9th Grade - University
20 questions
Cybersecurity Essentials Chapter 2 Review
Quiz
•
9th Grade - University
20 questions
Computer Science Concepts
Quiz
•
8th Grade - University
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
Discover more resources for Computers
11 questions
NFL Football logos
Quiz
•
KG - Professional Dev...
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)
Quiz
•
8th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms
Quiz
•
11th Grade - University
38 questions
Unit 6 Key Terms
Quiz
•
11th Grade - University
20 questions
La Hora
Quiz
•
9th Grade - University
7 questions
Cell Transport
Interactive video
•
11th Grade - University
7 questions
What Is Narrative Writing?
Interactive video
•
4th Grade - University