Quiz Summary
0 of 15 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 15
1. Question
A data analytics company has prioritized the numerous risks it faces and has ranked cyber risk as its number one priority. The following are some of the risks that the data analytics company faces.
Which of the below risks can be categorized as cyber risks (select all that apply)?
CorrectIncorrect -
Question 2 of 15
2. Question
Dumpster diving Is an example of:
CorrectIncorrect -
Question 3 of 15
3. Question
An information technology specialist has explained to Lily that the malware invading her data has attached itself to an existing programme and spreads as the program is used, shared or accessed within an existing network.
Which one of the following would be a logical solution to Lily’s problem?
CorrectIncorrect -
Question 4 of 15
4. Question
Emails disguised as legitimate messages but that contain malicious links or attachments that can deliver malware to an unsuspecting user is an example of which one of the following?
CorrectIncorrect -
Question 5 of 15
5. Question
Vancer PLC is a large data warehousing company based in the UK. An ex-employee of the company is looking to seek revenge against the company after being let go only a few months ago. The ex-employee plans to enter the business premises and physically destroy highly important hardware which will cause Vancer PLC a large amount of disruption.
The ex-employee dresses up in a suit and tie and convinces the security guard that he has been asked to return to the company for an exit interview. The security guard grants him access as the story seems believable and she lets the ex-employee walk into the premises without an ID card.
What type of activity has the ex-employee engaged in?
CorrectIncorrect -
Question 6 of 15
6. Question
Which of the following statements most accurately defines a white-hat hacker?
CorrectIncorrect -
Question 7 of 15
7. Question
Tests that individuals may encounter while making online purchases such as ‘I am not a robot’, where a human’s judgment is required to proceed can be classified as which one of the following types of controls?
CorrectIncorrect -
Question 8 of 15
8. Question
The integrity of data objective of cybersecurity can most closely be related to which one of the below statements?
CorrectIncorrect -
Question 9 of 15
9. Question
Hacking can most accurately be described as which one of the following?
CorrectIncorrect -
Question 10 of 15
10. Question
MVB is a national bank with sensitive information relating to hundreds of users. The bank’s system was recently breached by a group of hackers, named JKL. JKL identified a weakness in MVB’s system and offered to rectify it in exchange for a fee.
JKL can be classified as:
CorrectIncorrect -
Question 11 of 15
11. Question
An information technology specialist has explained to Lily that the malware invading her data has attached itself to an existing programme and spreads as the program is used, shared or accessed within an existing network.
Which of the following types of malware can this be categorized as?
CorrectIncorrect -
Question 12 of 15
12. Question
Which of the following are downside risks of security breaches (select ALL that apply):
CorrectIncorrect -
Question 13 of 15
13. Question
An electronics company has divided its customer’s data into segments and put a digital lock on it. The segments are referenced through area code and only a handful of people working in the area can access the relevant data through a pass code.
The electronics company’s digital lock enhances which objective of cybersecurity?
CorrectIncorrect -
Question 14 of 15
14. Question
Which of the following correctly describes cloud-based computing?
CorrectIncorrect -
Question 15 of 15
15. Question
Lee is the CEO of a highly successful accounting firm. In a recent analysis of the company costs, Lee has discovered that the highest percentage of costs over the last twenty years has been spent on digital advancement and cybersecurity.
The money spent on being digitally advanced and secure will be categorized as which one of the following PESTEL factors?
CorrectIncorrect