
Cybersecurity
Quiz
•
Computers
•
University
•
Practice Problem
•
Hard
Malena Prinzing
Used 5+ times
FREE Resource
Enhance your content in a minute
22 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
The deactivation of access to corporate systems and documents after an employee leaves a company is an example of which tool that ensures confidentiality? More than one answer may be correct.
access control
physical security
encryption
authentication
Answer explanation
Ensuring that former employees no longer have access to corporate materials is one way to maintain confidentiality. Access control ensures that the correct people will have access to confidential materials, while authentication validates a user to confirm that they should have access to such confidential materials.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Where are data in transit found?
in the cloud
on a cellular network
on a hard drive
on a smart appliance
Answer explanation
Data in transit is data that is moving between devices; therefore, data transmitted through a cellular network are considered data in transit.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?
prevent technology disruptions from occurring
conduct regular backups of data
outline specific recovery times for information technology to resume after an issue occurs
allow normal business operations to continue as soon as possible after an issue occurs
Answer explanation
The goal of an information technology disaster recovery plan (IT DRP) is to resume technological functions, not just general business functions, as soon as possible after an issue occurs. Outlining expected recovery times for IT to resume is one item that should be part of all IT DRPs.
4.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Describe steps in cybersecurity risk analysis. More than one answer may be correct.
estimate potential losses
assign value to assets
estimate the likelihood of occurrence of threats
train employees on cybersecurity
Answer explanation
The first step in a risk analysis is identification and valuation of an organization’s information assets. The second step is to estimate potential costs and losses per security incident, which include costs of malware attacks, fees and penalties associated with data breaches, and lost revenue. It is important to understand the probability of each type of security threat.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What does the identify (ID) function of the NIST Cybersecurity Framework focus on?
organizational implementation of an action plan in the event of a cybersecurity breach
organizational development of a plan of restoration in the event of a cybersecurity breach
organizational detection of cybersecurity events in a timely fashion
organizational understanding of how to manage cybersecurity risks
Answer explanation
The identify (ID) function aims to create an organizational awareness of associated risks in the context of their business and resources.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Why is a denial-of-service attack (DoS attack) a threat to data availability?
A DoS attack floods a system with incoming messages designed to trick an unsuspecting employee into granting unauthorized access to data
A DoS attack changes the data that is stored on the server, rendering it inaccurate
DoS attacks remove any encryptions that are placed around data, making them available without proper authentication
By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it
Answer explanation
In a DoS attack, a system is flooded with incoming messages. This creates a bandwidth problem for the system, forcing it to shut down, making the data inaccessible to those who legitimately have access to it.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the NIST Cybersecurity Framework functions investigates an organization’s cybersecurity management in the context of their business needs and resources?
recover (RC) function
detect (DE) function
identify (ID) function
protect (PR) function
Answer explanation
The ID function, the first of five in the framework, helps organizations better understand efforts needed to manage risks specific to their IT infrastructures.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
17 questions
Email Lớp 6
Quiz
•
6th Grade - University
20 questions
DreamWeaver CS6
Quiz
•
University
20 questions
Berpikir Komputasi - Assessment 1
Quiz
•
University
20 questions
Banco de Dados
Quiz
•
University - Professi...
20 questions
Uji Pengetahuan Jaringan Komputer
Quiz
•
9th Grade - University
19 questions
DSA Quest 1.0
Quiz
•
University
20 questions
Quiz #1 RStudio
Quiz
•
University
20 questions
C - Structures
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
