1) Why shouldn't you use WEP (Wired Equivalent Privacy)? a) It provides perfect forward secrecy. b) It offers the highest level of encryption. c) It is fully crack-able. d) It automatically updates encryption keys. 2) What does BYOD (Bring Your Own Device) refer to? a) Allowing employees to bring personal devices for use in the workplace. b) Providing employees with company-owned devices for personal use. c) A security standard for device management. d) The process of encrypting mobile devices. 3) What does COPE (Corporate Owned, Personally Enabled) mean? a) The COPEhort b) Employees are allowed to use their own devices for work but must adhere to corporate policies. c) Only the IT department has access to corporate devices. d) Employees are provided with a corporate device, but they are free to install apps and make personal calls. 4) What is CYOD (Choose Your Own Device)? a) Employees can choose their own devices, but the company provides software and policies for management. b) The company mandates a specific type of device to be used by all employees. c) Employees bring their own devices without any company policies. d) A system for managing all devices in a corporate network. 5) If your phone gets lost or stolen, should you wipe it? a) No, as the phone can be tracked down and recovered. b) Yes, wiping the phone will prevent unauthorized access to sensitive data. c) No, because only the SIM card needs to be replaced. d) Yes, but only if you suspect a security breach. 6) What is the easiest way to harden a network? a) UPDATE! b) Increase bandwidth to allow faster connections. c) Allow guest access to improve convenience. d) Use the default security settings of all devices. 7) What is an embedded device? a) A computer system designed to perform specific tasks, often with limited resources. b) A type of malware that affects mobile phones. c) A server used for large-scale processing. d) A personal device that connects to the internet. 8) When should you use a Sandbox? a) When running untrusted code or software (VIRUS), to prevent it from affecting the system. b) When installing a new operating system. c) When managing network traffic. d) When conducting regular data backups. 9) What is a Worm? a) A type of virus that requires user interaction to spread. b) A type of malware that replicates and spreads without user interaction. c) A malicious file that deletes other files on a computer. d) A type of encryption method for securing data. 10) Which of the following is a key characteristic of a DDoS (Distributed Denial of Service) attack? a) It encrypts data to make it unreadable. b) It floods a system with traffic to disrupt its normal operation. c) It targets individual users with malicious software. d) It involves stealing personal information from a system.

Leaderboard

Visual style

Options

Switch template

Continue editing: ?