Network Vulnerabilities & Business Impact

Network Vulnerabilities & Business Impact

University

40 Qs

quiz-placeholder

Similar activities

Chapter 1.1 Static & Dynamic Routing Protocols

Chapter 1.1 Static & Dynamic Routing Protocols

University

35 Qs

digital fluency - Test

digital fluency - Test

University

40 Qs

Software Security tut2

Software Security tut2

University

36 Qs

JKom

JKom

University

35 Qs

T Level - 7.2 Networking

T Level - 7.2 Networking

University

44 Qs

Section 9: Networking (1-6)

Section 9: Networking (1-6)

University

39 Qs

operating system

operating system

University

40 Qs

online cognitive test

online cognitive test

University

40 Qs

Network Vulnerabilities & Business Impact

Network Vulnerabilities & Business Impact

Assessment

Quiz

Computers

University

Hard

Created by

chris jackman

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves intercepting data transmitted between network devices?

Tapping/Eavesdropping

Denial of Service

Phishing

SQL Injection

Answer explanation

Tapping/Eavesdropping is the correct choice as it specifically refers to intercepting data transmitted between network devices, allowing unauthorized access to sensitive information.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which vulnerability affects communication lines according to network security principles?

Crosstalk and radiation

Only software bugs

User passwords only

Firewall settings

Answer explanation

Crosstalk and radiation are vulnerabilities that can interfere with communication lines, affecting data integrity and security. Other options like software bugs and firewall settings do not directly pertain to communication line vulnerabilities.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the threat hierarchy, which category includes fire and power failure?

Natural causes

Malicious intent

Directed attacks

Random attacks

Answer explanation

Fire and power failure are categorized as 'Natural causes' because they result from environmental factors rather than human actions or malicious intent.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a "benign intent" human-caused threat?

Human error/misconfiguration

Ransomware attack

Data theft

Impersonation

Answer explanation

Human error/misconfiguration is a benign intent threat as it arises from unintentional mistakes rather than malicious intent, unlike ransomware attacks, data theft, or impersonation, which are deliberate harmful actions.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of loss involves disruption to normal business operations?

Operational loss

Reputational loss

Financial loss

Answer explanation

Operational loss refers to disruptions in normal business operations, such as system failures or process breakdowns. This directly impacts the ability to conduct business effectively, making it the correct choice.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the maximum GDPR fine for data protection breaches?

€20 million or 4% of global turnover

€10 million or 2% of global turnover

€5 million or 1% of global turnover

€50 million or 10% of global turnover

Answer explanation

The maximum fine under GDPR for data protection violations is €20 million or 4% of global turnover, whichever is higher. This reflects the regulation's emphasis on serious penalties for non-compliance.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does PCI-DSS stand for?

Payment Card Industry Data Security Standard

Personal Card Information Data Security Standard

Payment Card International Data Security Standard

Protected Card Industry Data Security Standard

Answer explanation

PCI-DSS stands for Payment Card Industry Data Security Standard, which is the correct choice. It sets security standards for organizations that handle credit card information.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?