Search Header Logo

Enhancing Cyber Resilience through Assurance

Authored by Darshankumar Chauhan

Computers

Professional Development

Used 1+ times

Enhancing Cyber Resilience through Assurance
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary goal of data protection strategies in ICT infrastructure?

To increase network speed

To ensure confidentiality, integrity, and availability of data

To reduce hardware costs

To simplify user authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of a risk management framework in information assurance?

To eliminate all cyber threats

To identify, assess, and mitigate risks to ICT systems

To monitor employee productivity

To automate software updates

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes an incident response plan?

A document outlining daily IT tasks

A set of procedures for detecting, responding to, and recovering from cyber incidents

A list of all network devices

A schedule for software upgrades

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is security awareness training important for staff in an organisation?

It reduces the need for technical controls

It helps staff recognise and respond to security threats

It increases the number of passwords used

It replaces the need for firewalls

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of an access control mechanism?

Antivirus software

Password-protected user accounts

Data encryption

Network cabling

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of network security protocols?

To increase internet speed

To protect data during transmission across networks

To manage user accounts

To monitor physical access to servers

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common data protection strategy?

Regular data backups

Disabling firewalls

Sharing passwords

Ignoring software updates

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?