Week 1 review Sec+

Week 1 review Sec+

Professional Development

15 Qs

quiz-placeholder

Similar activities

BSBXCS402 Session 1 Cyber Security Awareness Quiz

BSBXCS402 Session 1 Cyber Security Awareness Quiz

Professional Development

10 Qs

CNS QUIZ

CNS QUIZ

Professional Development

10 Qs

SOF Day 2 Review

SOF Day 2 Review

Professional Development

11 Qs

Cryptography Chap-1

Cryptography Chap-1

9th Grade - Professional Development

15 Qs

Chapter 6 Quiz

Chapter 6 Quiz

Professional Development

20 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Web Application Security Testing-PostTest

Web Application Security Testing-PostTest

Professional Development

18 Qs

Introduction to Cybersecurity

Introduction to Cybersecurity

Professional Development

20 Qs

Week 1 review Sec+

Week 1 review Sec+

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Connor Hach

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization has set up an intrusion detection system (IDS) to monitor network traffic for suspicious activity and alert the security team in case of a potential threat. This system is an example of which type of security control?


Technical, Detective

Physical, Deterrent

Operational, Corrective

Managerial, Directive

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A government agency is upgrading its physical security measures to safeguard its premises from unauthorized entry. They plan to install security guards, access control vestibules, and bollards. Which security concept best describes their approach to controlling physical access to their facilities?

Zero Trust

Deception and Disruption technology

Authentication

Physical Security

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An IT department is rolling out a new version of software used across multiple departments. During the change management process, they identify that the new software version is incompatible with an older application that one department relies on. What aspect of the change management process did they likely overlook?


Approval process

Impact analysis

Documentation

Maintenance window

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a routine security audit, the IT team discovers gaps in log monitoring and reporting. Which tool or technology can the team implement to address this issue effectively?

SIEM

Antivirus software

Vulnerability scanner

Data loss prevention (DLP)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company's sensitive data was stolen by a highly sophisticated group that appeared to be well-funded and had access to advanced tools and techniques. This group was later identified as working on behalf of a foreign government. Which type of threat actor is responsible for this attack?


Hacktivist

Insider threat

Organized-crime

Nation-state

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A disgruntled employee intentionally leaked confidential company information to the public after being passed over for a promotion. What type of threat actor does this scenario describe?


Hacktivist

Insider threat

Unskilled attacker

Organized crime

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A large financial institution experiences a coordinated attack on its systems, resulting in a significant loss of customer data. The attackers demand a ransom to stop further attacks and to return the stolen data. Which motivation aligns with this scenario?


Philosophical/political beliefs

Disruption/chaos

Financial gain

Ethical

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?