1.1 and 1.2 Quiz Cyber

1.1 and 1.2 Quiz Cyber

Professional Development

29 Qs

quiz-placeholder

Similar activities

1002 A + Ch 04 & 05 Security Principles & Security Technologies

1002 A + Ch 04 & 05 Security Principles & Security Technologies

Professional Development

33 Qs

CompTIA A+ U9

CompTIA A+ U9

9th Grade - Professional Development

31 Qs

week 6 workshop quiz for sec+

week 6 workshop quiz for sec+

University - Professional Development

25 Qs

ESs_Prelim Quiz

ESs_Prelim Quiz

Professional Development

30 Qs

CompTIA A+ U10

CompTIA A+ U10

9th Grade - Professional Development

27 Qs

Planning a Network Infrastructure

Planning a Network Infrastructure

KG - Professional Development

26 Qs

CC MODEL EXAM-IV PART-A 7-12-2020

CC MODEL EXAM-IV PART-A 7-12-2020

Professional Development

30 Qs

CISSP CH1 Risk Management

CISSP CH1 Risk Management

Professional Development

28 Qs

1.1 and 1.2 Quiz Cyber

1.1 and 1.2 Quiz Cyber

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Graham Carmichael

Used 2+ times

FREE Resource

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of hazard can cause damage to data centers and networking equipment, leading to data loss and system downtime?

Fire

Power Outage

Flood

Earthquake

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT considered an environmental hazard in cyber security?

Fire

Storm

Power Surge

Flood

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary motive of cyber criminals?

Political Gain

Ideological Beliefs

Financial Gain

Espionage

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacktivists are primarily motivated by:

Financial Gain

Political or Ideological Reasons

Personal Vendettas

Corporate Rivalries

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

State-sponsored threat actors typically conduct which type of activities?

Social Engineering

Cyber Espionage

Phishing Attacks

Online Scams

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which threat actor is most difficult to detect due to their legitimate access to sensitive information?

Cyber Criminals

Hacktivists

State-sponsored Actors

Trusted Insiders

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unpatched systems are vulnerable because:

They have complex passwords

They lack the latest security updates

They use outdated algorithms

They are overburdened with data

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?