Chapter 9: Information Security & Ethics Quiz

Chapter 9: Information Security & Ethics Quiz

University

10 Qs

quiz-placeholder

Similar activities

Recap Handout 3 & 4

Recap Handout 3 & 4

6th Grade - University

15 Qs

Introduction to Cybersecurity Quiz

Introduction to Cybersecurity Quiz

9th Grade - University

15 Qs

3.1(a)(b) - Lecture

3.1(a)(b) - Lecture

University

15 Qs

Quiz #1

Quiz #1

University

13 Qs

CLC Lesson 8&9 Quiz

CLC Lesson 8&9 Quiz

University

12 Qs

cybersecurity-common security infrastructure security

cybersecurity-common security infrastructure security

University

15 Qs

Ethics - Week 5 Revision

Ethics - Week 5 Revision

University

10 Qs

How Cyber Safe Are You?

How Cyber Safe Are You?

University

10 Qs

Chapter 9: Information Security & Ethics Quiz

Chapter 9: Information Security & Ethics Quiz

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Elly Erlina

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a major factor contributing to the increasing vulnerability of information resources?

Increased computer skills

Limited access to technology

Interconnected business environments

High management support

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of social engineering?

A hacker stealing data through malware

A virus infecting a computer system

A user accidentally deleting important files

An employee giving their password to someone claiming to be IT support

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves unauthorized access to information?

Identity theft

Human error

Social engineering

Malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of deliberate software attack?

Phishing

Human error

Cyberterrorism

Ransomware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of access controls in information security?

To encrypt data during transmission

To restrict unauthorized access to information resources

To monitor employee behavior

To create backups of data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a physical control?

Firewalls

Passwords

Locks and guards

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does encryption do?

Prevents unauthorized access

Converts data into a readable format

Converts data into a form that cannot be read without a key

Monitors network traffic

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?