Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

University

9 Qs

quiz-placeholder

Similar activities

Information Assurance Concept

Information Assurance Concept

University

10 Qs

Mitigating Threats

Mitigating Threats

University

12 Qs

CH 12- Defense in Depth

CH 12- Defense in Depth

University

10 Qs

CID - Access COntrol

CID - Access COntrol

University

10 Qs

Chapter 4 Revision

Chapter 4 Revision

University

10 Qs

Re-Quiz Chapter 1: Introduction to Network Security

Re-Quiz Chapter 1: Introduction to Network Security

University

10 Qs

 Chapter 9: Securing Your System: Protecting Your Digital Data a

Chapter 9: Securing Your System: Protecting Your Digital Data a

University

13 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

University

10 Qs

Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

Assessment

Quiz

Computers

University

Hard

Created by

Vasaka Visoottiviseth

Used 3+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lucas successfully hacked to a company via a security vulnerability on their website. He did not damage or steal the data but just leave a message to the admin to fix the website bug.
Lucas is considered as what type of hacker?

Black Hat

White Hat

Grey Hat

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is NOT in the AAA model?

Access Control

Authentication

Authorization

Accounting

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The AAA model is used to ensure which principles of security?

C

I

A

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which process keeps track of what users do, including what they access?

Encryption

Authentication

Authorization

Accounting

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When you enter the hotel room by using the access card, this one is considered as authentication by using which of the below?

What You Know

What You Have

What You Are

What You Feel

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The One-Time-Password (OTP) you got via an SMS is considered as authentication by which one?

What You Know

What You Have

What You Are

What You See

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authentication by using both the password and an access card is considered as Multi-factor Authentication (MFA) ?

TRUE

FALSE

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data Backup is used to protect which principles of security?

C

I

A

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hashing is used to protect which principles of security?

C

I

A