Which of the following best describes the concept of "Defence in Depth" in cybersecurity?

Comp1300 Quiz1

Quiz
•
Information Technology (IT)
•
University
•
Easy
Min You
Used 7+ times
FREE Resource
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Using a single, highly secure firewall to protect an organisation
Implementing multiple layers of security controls to mitigate threats
Keeping all software up to date to prevent attacks
Disconnecting critical systems from the internet entirely
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What was the primary cause of the 2020 Toll Group cyberattack?
A phishing email that compromised employee credentials
A denial-of-service (DoS) attack that overwhelmed their servers
An insider threat from a disgruntled employee
A ransomware attack that exploited an unpatched system
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which social engineering attack involves an attacker looking over someone's shoulder to steal information?
Shoulder surfing
Smishing
Dumpster diving
Baiting
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What makes spear phishing different from regular phishing?
It targets a large group of people randomly
It includes fake advertisements to trick users
It is highly targeted towards a specific individual or organisation
It only uses phone calls instead of emails
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is an example of "system hardening"?
Ignoring software updates to maintain compatibility
Disabling unnecessary services and closing unused ports
Using public Wi-Fi to improve accessibility
Storing passwords in a text document for easy access
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
How can an organisation protect itself from smishing attacks?
By training employees not to click on suspicious links in text messages
By installing antivirus software on desktop computers
By setting up a firewall to block suspicious emails
By encrypting all company data
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following best explains the concept of "cyber hygiene"?
Only using security measures when an attack is detected
Installing firewalls and forgetting about security threats
Allowing employees to set their own security protocols
Regularly updating passwords and software to reduce vulnerabilities
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
InfoSec Quiz 1

Quiz
•
University
10 questions
IS Quiz

Quiz
•
University
10 questions
Ethical Hacking week #1

Quiz
•
University
12 questions
TcP252_k32_FQ1

Quiz
•
University
11 questions
Digital Footprint

Quiz
•
5th Grade - University
10 questions
Cloud Computing and web services Practice Quizes

Quiz
•
University
15 questions
Q6. Entity Clustering

Quiz
•
University
11 questions
QUIZ 3: SECURITY TOOLS and VULNERABILITY ANALYSIS

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade