Basic security

Basic security

Professional Development

9 Qs

quiz-placeholder

Similar activities

Standard Response Protocol

Standard Response Protocol

Professional Development

10 Qs

Security Risk Management

Security Risk Management

11th Grade - Professional Development

10 Qs

ALL BOARDS SUBJECT CUP-average

ALL BOARDS SUBJECT CUP-average

KG - Professional Development

10 Qs

FinTech 18-3 Blockchain

FinTech 18-3 Blockchain

Professional Development

8 Qs

AMLA Training 2022

AMLA Training 2022

Professional Development

12 Qs

SECaaS Day 2 - RSA Netwitness

SECaaS Day 2 - RSA Netwitness

Professional Development

10 Qs

Crisis Management

Crisis Management

Professional Development

10 Qs

ISMS Awareness Quiz

ISMS Awareness Quiz

Professional Development

5 Qs

Basic security

Basic security

Assessment

Quiz

Other

Professional Development

Medium

Created by

Akash Goel

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Non-Repudiation uses which kind of service to provide the receiver with evidence the message was sent by the user?
Proof of delivery
Proof of origin
Proof of identity
Proof of authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component defines the ability to protect data from unauthorized access?
Availability
Integrity
Confidentiality
Authenticity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When we talk about threats, people seek to cause damage with different motives known as threat actors however which of the following is NOT a motive of a threat actor?
Financial Gain
Trade Secrets
Emotional damage
Espionage
None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Risk assessment is a process to identify impact to business in case of an attack and it is often associated with the formula:
Hazard x Vulnerability x Impact
Threat x Vulnerability x Impact
Threat x Vulnerability x Security
Threat x Impact

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key component of a business continuity plan?
Excessive security
Employee Training
Secure office furniture
Routine Backups

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a business continuity plan?
Maximising profits
Reducing operational costs
Ensuring employee satisfaction
Maintaining business operations during disruptions

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe a deceptive technique where an attacker disguises their identity or manipulates information to appear as a trustworthy source?
Trojan Horse
Firewall
Spoofing
Decryption

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a threat profile in cybersecurity primarily focus on?
Identifying potential risks and vulnerabilities
Marketing strategies
Insider Threats
None of above

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a security policy in an organization?
Streamline Administrative Process
Define guidelines and rules for safeguarding information assets
Disaster Recovery
Enhance customer satisfaction