Set 3 - Foundations - Cybersecurity Quiz

Set 3 - Foundations - Cybersecurity Quiz

University

17 Qs

quiz-placeholder

Similar activities

Technical Writing

Technical Writing

University

20 Qs

Business circle

Business circle

University

15 Qs

ILC 1-to-1 Economics Collocations

ILC 1-to-1 Economics Collocations

University - Professional Development

16 Qs

Bloom's Taxonomy Quizs

Bloom's Taxonomy Quizs

University

20 Qs

Presentation Structure

Presentation Structure

University

12 Qs

Práctica Docente en el Aula

Práctica Docente en el Aula

University

12 Qs

Food Insecurity Quiz

Food Insecurity Quiz

9th Grade - University

16 Qs

On Screen B2+ Vocabulary check 1b

On Screen B2+ Vocabulary check 1b

5th Grade - Professional Development

20 Qs

Set 3 - Foundations - Cybersecurity Quiz

Set 3 - Foundations - Cybersecurity Quiz

Assessment

Quiz

English

University

Easy

Created by

Max Trần

Used 102+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The privacy protection of files on a local network can be best secured by:

SSL encryption on transfer.

Audit trails of document usage

Virus protection software.

Setting user permissions to restrict access.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT part of a good data management strategy?

Creating a strong data process

Identifying business objectives

Finding the right technologies

Installing malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Poor information security strategies are most likely to lead to:

A dynamic information culture

Financial loss and legal consequences

Advantage for the organisation over other companies

Operational disruptions and an increase in perceived reliability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Physical security for preventing unauthorised access include:

Locks.

Patching systems to the latest update.

Segmented networks.

User permission restrictions .

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of concern is bias in data analysis?

Legal

Ethical

Financial

Validation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

A type of cyber attack that exploits software vulnerabilities

A method of securing sensitive data using encryption

A technique for monitoring network traffic

An attempt to deceive individuals into revealing secure information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best description of the goal of cybersecurity?

Providing security against malware

Protecting a system to protect against cyber attacks

Protecting the confidentiality, integrity, and availability of information and systems

Ensuring privacy for users

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?