QUIZ MATERI #4

QUIZ MATERI #4

12th Grade

5 Qs

quiz-placeholder

Similar activities

Business Management & Organization

Business Management & Organization

9th - 12th Grade

10 Qs

Internet chapter 11th mass media

Internet chapter 11th mass media

11th - 12th Grade

9 Qs

Network Concepts

Network Concepts

9th - 12th Grade

10 Qs

Network+ Quiz

Network+ Quiz

12th Grade

10 Qs

Communication Management and Organizational Communication Quiz

Communication Management and Organizational Communication Quiz

12th Grade

10 Qs

Javone's NOCTI management exam quiz

Javone's NOCTI management exam quiz

9th - 12th Grade

10 Qs

CCL 421(2)

CCL 421(2)

8th - 12th Grade

10 Qs

Consumer Rights - Chapter Test

Consumer Rights - Chapter Test

10th - 12th Grade

10 Qs

QUIZ MATERI #4

QUIZ MATERI #4

Assessment

Quiz

Other

12th Grade

Medium

Created by

amrul jakarta

Used 2+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a "something you are" authentication factor?

A credit card presented to a cash machine

Your password and PIN

A user ID

A photograph of your face

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All of the following are important ways to practice an organization disaster recovery (DR) effort, which one is the most important?

Practice restoring data from backups

Facility evacuation drills

Desktop/tabletop testing of the plan

Running the alternate operating site to determine if it could handle critical functions in times of emergency

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When should a business continuity plan (BCP) be activated?

As soon as possible

At the very beginning of a disaster

When senior management decides

When instructed to do so by regulators

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker outside the organization attempts to gain access to the organization's internal files. This is an example of a(n) ______.

Intrusion

Exploit

Disclosure

Publication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are reviewing log data from a router; there is an entry that shows a user sent traffic through the router at 11:45 am, local time, yesterday. This is an example of a(n) _______.

Incident

Event

Attack

Threat