Unit 10: Cyber Security Quiz

Unit 10: Cyber Security Quiz

University

40 Qs

quiz-placeholder

Similar activities

Global info revision

Global info revision

11th Grade - University

40 Qs

акт 1

акт 1

University

40 Qs

E. 13 Technik Informatyk

E. 13 Technik Informatyk

7th Grade - University

41 Qs

IAS - Assignment 3

IAS - Assignment 3

University

40 Qs

Networking Concepts Quiz

Networking Concepts Quiz

University

40 Qs

System Integration-Midterm Exam

System Integration-Midterm Exam

University

40 Qs

Cryptography

Cryptography

10th Grade - University

35 Qs

IM1_Integrative Programming_LQ2

IM1_Integrative Programming_LQ2

University

37 Qs

Unit 10: Cyber Security Quiz

Unit 10: Cyber Security Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Rabiul Hasan

Used 1+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which ISO standard provides detailed guidance on selecting and implementing information security controls?

ISO/IEC 27001

ISO/IEC 38500

ISO/IEC 27002

ISO 9001

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the main focus of IT governance frameworks like COBIT and ISO/IEC 38500?

Data encryption

Policy enforcement

Aligning IT with business goals

Disaster recovery

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which encryption method is most suitable for protecting data in transit over the internet?

BitLocker

TDE

SSL/TLS

RSA only

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What key concept does Information Governance (IG) primarily support?

Service uptime

Financial growth

Regulatory compliance

Cost reduction

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which infrastructure model offers the highest scalability and disaster recovery?

Centralised

Decentralised

Distributed

Legacy

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which standard defines requirements for Information Security Management Systems (ISMS)?

ISO/IEC 27001

ISO/IEC 27002

GDPR

NIST

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a common method for protecting “data at rest”?

SSL

VPN

BitLocker

TLS

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?