Cybersecurity

Cybersecurity

University

22 Qs

quiz-placeholder

Similar activities

Database Management Systems

Database Management Systems

University

19 Qs

TENTENTENTENENEN

TENTENTENTENENEN

University

25 Qs

ICT Cybersecurity Essentials

ICT Cybersecurity Essentials

10th Grade - University

25 Qs

Day 2 Quiz 1

Day 2 Quiz 1

University

20 Qs

CYBERSECURITY QUIZ

CYBERSECURITY QUIZ

University

25 Qs

Operating System Security Quiz

Operating System Security Quiz

University

20 Qs

Quizzz 1.0

Quizzz 1.0

University

21 Qs

Information Technology Quiz Questions

Information Technology Quiz Questions

8th Grade - University

25 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Computers

University

Hard

Created by

Malena Prinzing

Used 5+ times

FREE Resource

22 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

The deactivation of access to corporate systems and documents after an employee leaves a company is an example of which tool that ensures confidentiality? More than one answer may be correct.

access control

physical security

encryption

authentication

Answer explanation

Ensuring that former employees no longer have access to corporate materials is one way to maintain confidentiality. Access control ensures that the correct people will have access to confidential materials, while authentication validates a user to confirm that they should have access to such confidential materials.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Where are data in transit found?

in the cloud

on a cellular network

on a hard drive

on a smart appliance

Answer explanation

Data in transit is data that is moving between devices; therefore, data transmitted through a cellular network are considered data in transit.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?

prevent technology disruptions from occurring

conduct regular backups of data

outline specific recovery times for information technology to resume after an issue occurs

allow normal business operations to continue as soon as possible after an issue occurs

Answer explanation

The goal of an information technology disaster recovery plan (IT DRP) is to resume technological functions, not just general business functions, as soon as possible after an issue occurs. Outlining expected recovery times for IT to resume is one item that should be part of all IT DRPs.

4.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Describe steps in cybersecurity risk analysis. More than one answer may be correct.

estimate potential losses

assign value to assets

estimate the likelihood of occurrence of threats

train employees on cybersecurity

Answer explanation

The first step in a risk analysis is identification and valuation of an organization’s information assets. The second step is to estimate potential costs and losses per security incident, which include costs of malware attacks, fees and penalties associated with data breaches, and lost revenue. It is important to understand the probability of each type of security threat.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does the identify (ID) function of the NIST Cybersecurity Framework focus on?

organizational implementation of an action plan in the event of a cybersecurity breach

organizational development of a plan of restoration in the event of a cybersecurity breach

organizational detection of cybersecurity events in a timely fashion

organizational understanding of how to manage cybersecurity risks

Answer explanation

The identify (ID) function aims to create an organizational awareness of associated risks in the context of their business and resources.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why is a denial-of-service attack (DoS attack) a threat to data availability?

A DoS attack floods a system with incoming messages designed to trick an unsuspecting employee into granting unauthorized access to data

A DoS attack changes the data that is stored on the server, rendering it inaccurate

DoS attacks remove any encryptions that are placed around data, making them available without proper authentication

By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it

Answer explanation

In a DoS attack, a system is flooded with incoming messages. This creates a bandwidth problem for the system, forcing it to shut down, making the data inaccessible to those who legitimately have access to it.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the NIST Cybersecurity Framework functions investigates an organization’s cybersecurity management in the context of their business needs and resources?

recover (RC) function

detect (DE) function

identify (ID) function

protect (PR) function

Answer explanation

The ID function, the first of five in the framework, helps organizations better understand efforts needed to manage risks specific to their IT infrastructures.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?