Want to make interactive content? It’s easy in Genially!

Over 30 million people build interactive content in Genially.

Check out what others have designed:

Transcript

QUIZ

Cyber Awarnes

Play

What is the main purpose of penetration testing?

To encrypt sensitive data for protection

Using more than one method to verify your identity when logging in

To find and exploit vulnerabilities in a system to improve security

To test if antivirus software is working properly

What is the main purpose of penetration testing?

To encrypt sensitive data for protection

Using more than one method to verify your identity when logging in

Next

To find and exploit vulnerabilities in a system to improve security

To test if antivirus software is working properly

What is encryption?

A process to scramble data so only authorized users can read it

A way to speed up your system performance

A method to store passwords securely

A tool to automatically scan files for malware

What is encryption?

A process to scramble data so only authorized users can read it

A way to speed up your system performance

Next

A method to store passwords securely

A tool to automatically scan files for malware

What is Active Cyber Defence (ACD)?

A proactive approach to defend against and respond to cyber threats

A service that encrypts emails for extra security

A program that monitors social media for threats

A type of firewall that blocks all incoming traffic

What is Active Cyber Defence (ACD)?

A proactive approach to defend against and respond to cyber threats

A service that encrypts emails for extra security

Next

A program that monitors social media for threats

A type of firewall that blocks all incoming traffic

Which of the following is a key aspect of security architecture?

Building hardware firewalls for physical security

Allowing unrestricted data access across departments

Designing systems to be both secure and scalable

Ensuring user-friendly software for employees

Which of the following is a key aspect of security architecture?

Building hardware firewalls for physical security

Allowing unrestricted data access across departments

Next

Designing systems to be both secure and scalable

Ensuring user-friendly software for employees

How can vulnerabilities be discovered in a system?

By waiting for an attack to occur

Through penetration testing and continuous monitoring

By disabling the firewall for easier access

Using older software to avoid new bugs

How can vulnerabilities be discovered in a system?

By waiting for an attack to occur

Through penetration testing and continuous monitoring

Next

By disabling the firewall for easier access

Using older software to avoid new bugs

You protected yourself onine

Wrong answer