Show
An official website of the United States government Translation Menu
Secondary Menu
Main Menu Mega
Translation Menu
Secondary Menu
Enter Search Term(s): Looking for legal documents or records? Search the Legal Library instead. Breadcrumb
Vea esta página en español Cybersecurity Basics QuizPhysical Security QuizRansomware QuizPhishing QuizTech Support Scams QuizVendor Security QuizSecure Remote Access QuizAdditional ResourcesCheck out these additional resources like downloadable guides Guide for EmployersStart a Discussion Cybersecurity QuizzesTest Your Knowledge Get the MaterialsDownload Materials Order Free Publications Cybersecurity Video SeriesSee All Topics More FTC Small BusinessGo to FTC.gov/SmallBusiness Sign up to Receive the FTC Business BlogSign Up Return to top How well do you know the basics of cyber security? Take this 10-question quiz and test your general cyber security knowledge! Everyone in the organization.
the CIO or CISO executive. A specialized cyber security defense team. The
board of directors. Loss of confidence in the organization. Civil liability.
Criminal prosecution. All of the above. It is less expensive than using specialized cyber workers.
Absolute protection cannot be guaranteed. Both answers above. None
of the above. The likelihood of a threat happening The vulnerability of the organization to the threat
The cost to mitigate or recover from the threat The duration of the threat event Trust manipulation Desire to be helpful Lack of understanding All of the above Question Title* 6. Redundant computer servers would be an example of which type of security measure?Detective Corrective Preventative
Deterrent Question Title* 7. To avoid , user input should not be put directly into a database.Cross-site scripting Buffer overflow. SQL injection. System shutdown. Question Title* 8. With regards to BYOD (Bring Your Own Device) it is usually safest and cost effective to:Disallow BYOD altogether. Allow BYOD in accordance with a specified policy. Allow BYOD only if a Mobile Device Management (MDM) tool is available. Limit BYOD to quarantined or isolated networks. Question Title* 9. Behavior-based intrusion detection is an improvement compared to rule-based because:It decreases the number of false positives, especially early in deployment. It examines all out-of-the-normal cases, not just ones specified in a script. It requires establishing baseline behavior. All of the above. Question Title* 10. Which of the following is true for an Advanced Persistent Threat (APT)?They are easily detected by anti-virus software. They seek targets of opportunity as opposed to specific organizations. They evade detection by re-encrypting or repackaging their code. All of the above. What are some cyber security questions?Basic Cyber Security Interview Questions and Answers. What is cryptography?. What is traceroute? Mention its uses.. What is a firewall? Mention its uses.. What is a three-way handshake?. What is a response code? List them.. What is the CIA triad?. What are the common cyberattacks?. What is data leakage?. What are the 3 main pillars of cyber security?When we discuss data and information, we must consider the CIA triad. The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability.
What are 3 challenges of cyber security?Ransomware Attacks. Ransomware is the biggest concern now in the digital world. ... . IoT Attacks (Internet of Things) The Internet of Things or IoT is the most vulnerable to data security threats. ... . Cloud Attacks. ... . Phishing Attacks. ... . Cryptocurrency and Blockchain Attacks.. What are the 10 recommended tips for cyber security?Top 11 tips for cyber security. Back up your data. ... . Keep your devices and your apps up-to-date. ... . Choose unique passwords. ... . Turn on two-factor authentication. ... . Be creative with the answers to your account recovery questions. ... . Avoid sensitive transactions on free wifi. ... . Install an antivirus and scan for viruses regularly.. |