Cyber Security Fundamental-SP

Cyber Security Fundamental-SP

10th Grade

10 Qs

quiz-placeholder

Similar activities

Water

Water

5th - 11th Grade

10 Qs

Perdagangan antardaerah dan negara

Perdagangan antardaerah dan negara

5th Grade - University

10 Qs

Romanian Folklore

Romanian Folklore

8th - 10th Grade

11 Qs

Konark Sun Temple

Konark Sun Temple

6th - 12th Grade

12 Qs

Greetings and Farewells

Greetings and Farewells

KG - University

10 Qs

Importância do Orçamento de Estado

Importância do Orçamento de Estado

10th Grade

10 Qs

At the weather centre

At the weather centre

9th - 12th Grade

12 Qs

Chapitre introductif: économie, sociologie, science politique

Chapitre introductif: économie, sociologie, science politique

1st - 12th Grade

10 Qs

Cyber Security Fundamental-SP

Cyber Security Fundamental-SP

Assessment

Quiz

Education

10th Grade

Medium

Created by

YOFI ANSHARY

Used 2+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of a "something you know" authentication factor?

User ID

Password

Fingerprint

iris scan

Answer explanation

B is correct. A password is something the user knows and can present as an authentication factor to confirm an identity assertion. A is incorrect because a user ID is an identity assertion, not an authentication factor. C and D are incorrect as they are examples of authentication factors that are something you are, also referred to as "biometrics."

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Within the organization, who can identify risk?

The Security Manager

any security team member

senior management

anyone

Answer explanation

D is correct. Anyone within the organization can identify risk

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A vendor sells a particular operating system (OS). In order to deploy the OS securely on different platforms, the vendor publishes several sets of instructions on how to install it, depending on which platform the customer is using. This is an example of a .......

law

procedure

standard

policy

Answer explanation

B is correct. This is a set of instructions to perform a particular task, so it is a procedure (several procedures, actually—one for each platform). A is incorrect; the instructions are not a governmental mandate. C is incorrect, because the instructions are particular to a specific product, not accepted throughout the industry. D is incorrect, because the instructions are not particular to a given organization.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Of the following, which would probably not be considered a threat?

Natural DIsaster

Unintentional damage to the system caused by a user

A laptop with sensitivie data on it

An external attacker trying to gain unauthorized access to the environment

Answer explanation

C is correct. A laptop, and the data on it, are assets, not threats. All the other answers are examples of threats, as they all have the potential to cause adverse impact to the organization and the organization's assets.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

For which of the following assests is integrity probably the most important security aspect?

One frame of a streaming video

The file that contains passwords used to authenticate users

The color scheme of a marketing website

Software that checks the spelling of product descriptions for a retail website

Answer explanation

B is correct. If a password file is modified, the impact to the environment could be significant; there is a possibility that all authorized users could be denied access, or that anyone (including unauthorized users) could be granted access. The integrity of the password file is probably the most crucial of the four options listed. A is incorrect because one frame of an entire film, if modified, probably would have little to no effect whatsoever on the value of the film to the viewer; a film has thousands (or tens of thousands, or millions) of frames. C is incorrect because a change in marketing material, while significant, is not as crucial as the integrity of the password file described in Answer B. D is incorrect because a typo in a product description is not likely to be as important as the integrity of the password file described in Answer B

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Kerpak works in the security office of a medium-sized entertainment company. Kerpak is asked to assess a particular threat, and he suggests that the best way to counter this threat would be to purchase and implement a particular security solution. This is an example of ......

Acceptance

Avoidance

Mitigation

Transference

Answer explanation

C is correct. Applying a security solution (a type of control) is an example of mitigation. A is incorrect; if Kerpak suggested acceptance, then the threat, and the acceptance of the associated risk, only needs to be documented—no other action is necessary. B is incorrect; if Kerpak suggested avoidance, the course of action would be to cease whatever activity was associated with the threat. D is incorrect; if Kerpak suggested transference, this would involve forming some sort of risk-sharing relationship with an external party, such as an insurance underwriter.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The city of Grampon wants to know where all its public vehicles (garbage trucks, police cars, etc.) are at all times, so the city has GPS transmitters installed in all the vehicles. What kind of control is this?

Administrative

Entrenched

Physical

Technical

Answer explanation

D is correct. A GPS unit is part of the IT environment, so this is a technical control. A is incorrect. The GPS unit itself is not a rule or a policy or a process; it is part of the IT environment, so D is a better answer. B is incorrect; "entrenched" is not a term commonly used to describe a particular type of security control, and is used here only as a distractor. C is incorrect; while a GPS unit is a tangible object, it is also part of the IT environment, and it does not interact directly with other physical objects in order to prevent action, so "technical" is a better descriptor, and D is a better answer.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?