Quiz Summary
0 of 15 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 15
1. Question
Kajol is a chemistry student who is writing a research paper. She is currently using an old laptop and wants to store her work in a manner that it’s not affected by a laptop malfunctioning.
Which of the following can be used to create a back-up of Kajol’s data?
CorrectIncorrect -
Question 2 of 15
2. Question
Outsourcing the IT functions to back office processing companies is an example of which approach to risk management?
CorrectIncorrect -
Question 3 of 15
3. Question
Liam recently received a new version of an anti-virus software. The update addresses a known vulnerability and provides a new and improved version of the software.
Which of the following can this be classified as?
CorrectIncorrect -
Question 4 of 15
4. Question
Which of the following most accurately describe ‘encryption’?
CorrectIncorrect -
Question 5 of 15
5. Question
Which of the following most accurately describes ‘internet of things’?
CorrectIncorrect -
Question 6 of 15
6. Question
Input, processing and output controls are examples of:
CorrectIncorrect -
Question 7 of 15
7. Question
Which of the following most accurately defines ‘firewall’?
CorrectIncorrect -
Question 8 of 15
8. Question
Mia reviews the Facebook profile of every person who sends her a friendship request. This is an example of which strategy regarding cyber risk?
CorrectIncorrect -
Question 9 of 15
9. Question
Acquisition, Maintenance and Updates are examples of:
CorrectIncorrect -
Question 10 of 15
10. Question
Personnel cybersecurity planning includes (select ALL that apply):
CorrectIncorrect -
Question 11 of 15
11. Question
Which of the following are examples of devices that can be exploited to gather data through the internet of things? (Select ALL that apply)
CorrectIncorrect -
Question 12 of 15
12. Question
Sophisticated encryption techniques include (select ALL that apply):
CorrectIncorrect -
Question 13 of 15
13. Question
Cybersecurity controls can be (select ALL that apply):
CorrectIncorrect -
Question 14 of 15
14. Question
The Company Astron found that at least 80% of all cybersecurity incidents have arisen from malware caused by staff clicking on bogus emails. What would be the appropriate form of response?
CorrectIncorrect -
Question 15 of 15
15. Question
Kim has been hired as a cyber security specialist by an organization. Her first order of business has been to describe strategies that organizations can use to identify the risk an organization faces from third parties.
She explains to management that they should always assume that the organization’s systems will eventually be hacked into and should have a contingency plan in place for whenever that happens.
Which of the following is Kim describing above?
CorrectIncorrect