IAS Cybersec

IAS Cybersec

University

33 Qs

quiz-placeholder

Similar activities

FIREWALL ️‍🔥

FIREWALL ️‍🔥

University

30 Qs

Cybersecurity Resilience Quiz

Cybersecurity Resilience Quiz

University

29 Qs

IT308 IAS Quiz No 1 IT3GG1

IT308 IAS Quiz No 1 IT3GG1

University

30 Qs

IT Security Audit

IT Security Audit

University

30 Qs

Flareup CSI

Flareup CSI

12th Grade - University

30 Qs

Introduction to Cryptography (Kolokfiumi II, Grupi 1, TE)

Introduction to Cryptography (Kolokfiumi II, Grupi 1, TE)

University

30 Qs

CyberSecurity LongQuiz (Prelim)

CyberSecurity LongQuiz (Prelim)

University

30 Qs

IT QUIZ BEE

IT QUIZ BEE

University

35 Qs

IAS Cybersec

IAS Cybersec

Assessment

Quiz

Computers

University

Hard

Created by

John Bernie Ruiz

Used 4+ times

FREE Resource

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is true about Framework Core and Framework Profiles?

A. Framework Core is primarily used to identify and prioritize opportunities for improving cybersecurity.

B. Framework Profiles provide a set of desired cybersecurity activities and outcomes using a common language.

A only
B only
Both A & B
Neither

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is true about ISO 111111 and ISO/IEC 27000?

A. ISO 111111 is a systematic approach to manage sensitive information securely.

B. ISO/IEC 27000 is divided into sub-standards, some specific to industries or operational choices.

A only
B only
Both A & B
Neither

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is true about employees and cybersecurity?

A. Employees can create some of the greatest risks to cybersecurity.

B. If employees are well informed about cybersecurity, they can also be an asset and the first line of defense.

A only
B only
Both A & B
Neither

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is true about PCI DSS?

A. PCI DSS stands for Payment Card Industry Data Security Standard.

B. PCI DSS ensures businesses process card payments securely.

A only
B only
Both A & B
Neither

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is true about security architecture?

A. Its main advantage is standardization. B. It is cost-effective due to re-use of controls.

A only
B only
Both A & B
Neither

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is true about cybersecurity tactics?

A. Layered defense involves implementing multiple security technologies.

B. Inception technology is a recommended tactic for IT teams.

A only
B only
Both A & B
Neither

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is true about integrity?

A. Data integrity ensures consistent and expected results with expected performance.

B. System integrity protects against unauthorized changes or tampering of data.

A only
B only
Both A & B
Neither

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?