Sample Quiz Part 2 PDF
Document Details
Uploaded by EasyToUseResilience
Nanyang Technological University
Dr M Y Siyal
Tags
Related
- Chapter 5 - 02 - UISG and Compliance Program PDF
- Chapter 5 - 01 - Discuss Various Regulatory Frameworks, Laws, and Acts PDF
- Certified Cybersecurity Technician Exam 212-82 PDF
- ANNEX Guidelines on Cyber Security Onboard Ships v.4 PDF
- Introduction to Cybersecurity PDF
- EE6102: Cyber Security and Blockchain Technology PDF
Summary
This is a sample quiz covering various aspects of cyber security, including industry 4.0, digital twins, and related concepts. The quiz contains multiple choice questions.
Full Transcript
1. The term industry 4 or i4.0 originated in __________. a. USA b. China and Singapore c. Both a and b d. None of the above 2. i4.0 encompasses a wide range of advanced technologies, such as: a. Digital twins and artificial intelligence b. High-speed wir...
1. The term industry 4 or i4.0 originated in __________. a. USA b. China and Singapore c. Both a and b d. None of the above 2. i4.0 encompasses a wide range of advanced technologies, such as: a. Digital twins and artificial intelligence b. High-speed wireless/wired networks c. Cloud computing and virtualization d. All of the above 3. IoT are driving force for industry 4.0, however __________. a. Currently they are only being used in smart homes b. They are vulnerable to cyber security attacks c. They will only be popular in 2030, which might be too late d. None of the above Dr M Y Siyal Q2-1 4. Choose the correct statement about Digital Twins. a. It is a virtual representation or digital replica (copy) of assets, people, processes, systems, devices, and places b. Companies utilize digital twin technology to develop virtual prototypes of new products and get insights c. Both a and b d. None of the above 5. The concept of Industry 4.0 depends upon connectivity, however, this interconnectivity creates cyber security holes. a. True b. False 6. Cloud computing is one of the driving forces for industry 4.0 however using DDoS attack, its availability can be compromised. The other attacks can result in __________ of the stored data. a. Confidentiality b. Integrity c. Both a and b d. None of the above Dr M Y Siyal Q2-2 7. The main reason for cyber security compromises is employee behavior which can be__________. a. Malicious b. Unintentional c. Both a and b d. None of the above 8. The principal problems associated with employee behavior in cyber security includes __________. a. Errors and omissions b. Fraud c. Actions by disgruntled employees d. All of the above 9. Choose the correct statement about cyber security awareness, training and education. a. Can serve as a deterrent to fraud and actions by disgruntled employees, by increasing employee’s knowledge of their accountability and of potential penalties b. Employees cannot be asked to attend cyber security awareness program as this will make them liable c. Both a and b d. None of the above Dr M Y Siyal Q2-3 10. Cyber security awareness policy should include. a. Participation is required for every employee b. Everyone will be given sufficient time to participate c. Both a and b d. None of the above 11. Cyber security training teaches what people should do and how they should do it. a. True b. False 12.Choose the correct social engineering examples. a. Phone Call: This is John, the System Administrator. What is your password? b. Email: ABC Bank has noticed a problem with your account, click on the link below and provide the password to resolve it c. Both a and b d. None of the above Dr M Y Siyal Q2-4 13. Spear phishing scam is when they target you specifically. They have researched you, they know your family members, where you work, and who is your boss. The chances of fooling you are higher. a. True. b. False 14. Some of the top search results in Google are phishing links. a. True b. False 15. Social media is full of fake accounts and scammers make it look like it is your real friend. a. True b. False 16.In vishing attack, which is made over the telephone, scammers can spoof a phone number that looks identical to a known number, like your bank. a. True b. False Dr M Y Siyal Q2-5 17. Choose the correct statement about cyber security compliance. a. It means following standards and regulatory requirements set by some agency, law or authority group. b. It means make cyber security challenging both for attackers and users c. Both a and b d. None of the above 18. Some benefits of Cybersecurity Compliance include: a. Helps identify, interpret and prepare for potential data breaches b. Improves an organization’s security position c. Builds customer confidence and loyalty d. All of the above 19.Forming a compliance team is necessary when implementing a thorough compliance program. a. True b. False 20.Cyber security controls can be technical controls (passwords), or physical (camera and fences). a. True b. False Dr M Y Siyal Q2-6