Cyber awarenes quizz 3
Alexandrina Palii
Created on October 17, 2024
Over 30 million people build interactive content in Genially.
Check out what others have designed:
TRUE FALSE GEOGRAPHY
Quizzes
ENGLISH SCHOOL VOCABULARY
Quizzes
PARTS OF SPEECH REVIEW
Quizzes
ANIMALS BY CATEGORY
Quizzes
DRACULA ESL
Quizzes
MODALS 1 BACH MARIO GAME
Quizzes
RECYCLING SORTING GAME
Quizzes
Transcript
QUIZ
Cyber Awarnes
Play
What is the main purpose of penetration testing?
To encrypt sensitive data for protection
Using more than one method to verify your identity when logging in
To find and exploit vulnerabilities in a system to improve security
To test if antivirus software is working properly
What is the main purpose of penetration testing?
To encrypt sensitive data for protection
Using more than one method to verify your identity when logging in
Next
To find and exploit vulnerabilities in a system to improve security
To test if antivirus software is working properly
What is encryption?
A process to scramble data so only authorized users can read it
A way to speed up your system performance
A method to store passwords securely
A tool to automatically scan files for malware
What is encryption?
A process to scramble data so only authorized users can read it
A way to speed up your system performance
Next
A method to store passwords securely
A tool to automatically scan files for malware
What is Active Cyber Defence (ACD)?
A proactive approach to defend against and respond to cyber threats
A service that encrypts emails for extra security
A program that monitors social media for threats
A type of firewall that blocks all incoming traffic
What is Active Cyber Defence (ACD)?
A proactive approach to defend against and respond to cyber threats
A service that encrypts emails for extra security
Next
A program that monitors social media for threats
A type of firewall that blocks all incoming traffic
Which of the following is a key aspect of security architecture?
Building hardware firewalls for physical security
Allowing unrestricted data access across departments
Designing systems to be both secure and scalable
Ensuring user-friendly software for employees
Which of the following is a key aspect of security architecture?
Building hardware firewalls for physical security
Allowing unrestricted data access across departments
Next
Designing systems to be both secure and scalable
Ensuring user-friendly software for employees
How can vulnerabilities be discovered in a system?
By waiting for an attack to occur
Through penetration testing and continuous monitoring
By disabling the firewall for easier access
Using older software to avoid new bugs
How can vulnerabilities be discovered in a system?
By waiting for an attack to occur
Through penetration testing and continuous monitoring
Next
By disabling the firewall for easier access
Using older software to avoid new bugs
You protected yourself onine
Wrong answer