Comp1300 Quiz1

Comp1300 Quiz1

University

13 Qs

quiz-placeholder

Similar activities

Basics of Network and Internet Safety

Basics of Network and Internet Safety

10th Grade - University

10 Qs

How Cyber Safe Are You?

How Cyber Safe Are You?

University

10 Qs

QUIZ-1 KELAS XI

QUIZ-1 KELAS XI

University

10 Qs

QUIZ 3: SECURITY TOOLS and  VULNERABILITY ANALYSIS

QUIZ 3: SECURITY TOOLS and VULNERABILITY ANALYSIS

University

11 Qs

InfoSec Quiz 1

InfoSec Quiz 1

University

15 Qs

Introduction to Cybersecurity Quiz

Introduction to Cybersecurity Quiz

9th Grade - University

15 Qs

IS Quiz

IS Quiz

University

10 Qs

Data Security

Data Security

12th Grade - University

17 Qs

Comp1300 Quiz1

Comp1300 Quiz1

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Min You

Used 7+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following best describes the concept of "Defence in Depth" in cybersecurity?

Using a single, highly secure firewall to protect an organisation

Implementing multiple layers of security controls to mitigate threats

Keeping all software up to date to prevent attacks

Disconnecting critical systems from the internet entirely

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What was the primary cause of the 2020 Toll Group cyberattack?

A phishing email that compromised employee credentials

A denial-of-service (DoS) attack that overwhelmed their servers

An insider threat from a disgruntled employee

A ransomware attack that exploited an unpatched system

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which social engineering attack involves an attacker looking over someone's shoulder to steal information?

Shoulder surfing

Smishing

Dumpster diving

Baiting

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What makes spear phishing different from regular phishing?

It targets a large group of people randomly

It includes fake advertisements to trick users

It is highly targeted towards a specific individual or organisation

It only uses phone calls instead of emails

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of "system hardening"?

Ignoring software updates to maintain compatibility

Disabling unnecessary services and closing unused ports

Using public Wi-Fi to improve accessibility

Storing passwords in a text document for easy access

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How can an organisation protect itself from smishing attacks?

By training employees not to click on suspicious links in text messages

By installing antivirus software on desktop computers

By setting up a firewall to block suspicious emails

By encrypting all company data

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following best explains the concept of "cyber hygiene"?

Only using security measures when an attack is detected

Installing firewalls and forgetting about security threats

Allowing employees to set their own security protocols

Regularly updating passwords and software to reduce vulnerabilities

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?