
InfoSec Quiz 1

Quiz
•
Information Technology (IT)
•
University
•
Easy
Ardi Moran
Used 2+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A software company wants to adopt a security framework that ensures compliance with industry regulations and improves its overall security posture.
Which of the following frameworks should they consider?
NIST Cybersecurity Framework
COBIT
ISO/IEC 27001
All of the above
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user reports that their files have become inaccessible and are displaying a message demanding payment for decryption.
What type of malware is involved?
Spyware
Trojan horse
Ransomware
Adware
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company's IT team discovers an attacker has gained unauthorized access to their internal systems through a vulnerability that had a patch released three months ago but was never applied.
What could have prevented this security breach?
Regular software updates and patch management
Disabling all network connections
Encrypting all incoming emails
Blocking all remote access
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker bombards a company's web server with a massive amount of fake traffic, causing it to crash.
Which type of attack is taking place?
SQL Injection
Denial-of-service (DoS)
Insider threat
Phishing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company wants to ensure its data remains available to employees even in the event of a cyberattack.
Which security principle does this align with?
Confidentiality
Integrity
Availability
Redundancy
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An employee working remotely logs into a company system using only a simple password. Later, unauthorized access is detected from an unknown device.
What security measure could have prevented this incident?
Multi-factor authentication (MFA)
Disabling employee remote access
Allowing password reuse
Using a default VPN
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company's database containing customer information was accessed by an unauthorized individual. The company discovered that a weak default password was still being used for administrative access.
Which security vulnerability contributed to this breach?
Social engineering
Outdated antivirus software
Use of default credentials
Secure encryption protocols
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
FDBS Lesson 1 Quiz (Quiz #1)

Quiz
•
University
19 questions
SAA-C03 (200-219)

Quiz
•
University
20 questions
Understanding Cyber Security Concepts

Quiz
•
University
13 questions
Exploring Computer Network Models

Quiz
•
10th Grade - University
12 questions
CLC Unit 2 Lesson 1,2,3 and 4 Quiz

Quiz
•
University
14 questions
ICT and Multimedia Quiz

Quiz
•
12th Grade - University
11 questions
The Rise of the Services Sector: Driving Growth and Innovation

Quiz
•
University
10 questions
Chapter 8 Quiz II

Quiz
•
University
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Information Technology (IT)
11 questions
NFL Football logos

Quiz
•
KG - Professional Dev...
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
38 questions
Unit 6 Key Terms

Quiz
•
11th Grade - University
20 questions
La Hora

Quiz
•
9th Grade - University
7 questions
Cell Transport

Interactive video
•
11th Grade - University
7 questions
What Is Narrative Writing?

Interactive video
•
4th Grade - University