photo

Computing Tic Tac Toe

Photo
... Read More ... Read less
45 Questions
What security control confirms who a user is before granting access? Which PPT element includes incident response plans and backup procedures?
Game Language : English
dislike icon
publicdiscoverable
downloadable

Get Started with the #1 Free Online Quiz Maker

Create a fun and engaging trivia quiz in minutes!

Questions

  • Round 1
  • Question 1
    Q.
    What security control confirms who a user is before granting access?
    A.
    Authentication
    edit question Clone to My Questions
    Question 2
    Q.
    Which PPT element includes incident response plans and backup procedures?
    A.
    Process
    edit question Clone to My Questions
    Question 3
    Q.
    Giving users only the access they need is known as what?
    A.
    Least Privilege
    edit question Clone to My Questions
    Question 4
    Q.
    What type of malware locks files and demands payment?
    A.
    Ransomware
    edit question Clone to My Questions
    Question 5
    Q.
    Which CIA principle is affected when unauthorised changes are made to data?
    A.
    Integrity
    edit question Clone to My Questions
    Question 6
    Q.
    What process ensures updates are applied regularly and consistently?
    A.
    Patch management
    edit question Clone to My Questions
    Question 7
    Q.
    What document defines how an organisation responds to a cyber incident?
    A.
    Incident response plan
    edit question Clone to My Questions
    Question 8
    Q.
    Which control supports both confidentiality and integrity?
    A.
    Access permissions
    edit question Clone to My Questions
    Question 9
    Q.
    A phishing email bypasses the spam filter and is opened by a user. Which combination of PPT elements failed?
    A.
    People and technology
    edit question Clone to My Questions
  • Round 2
  • Question 1
    Q.
    Which CIA principle is affected if data is deleted accidentally?
    A.
    Integrity
    edit question Clone to My Questions
    Question 2
    Q.
    Which PPT element is responsible for defining how incidents are reported and handled?
    A.
    Process
    edit question Clone to My Questions
    Question 3
    Q.
    What attack uses deception to trick users into giving information?
    A.
    Social engineering
    edit question Clone to My Questions
    Question 4
    Q.
    What is the primary purpose of audit logs in an organisation?
    A.
    Provide evidence of system activity
    edit question Clone to My Questions
    Question 5
    Q.
    What CIA principle is compromised when customer data is leaked?
    A.
    Confidentiality
    edit question Clone to My Questions
    Question 6
    Q.
    What type of malware secretly records user activity?
    A.
    Spyware
    edit question Clone to My Questions
    Question 7
    Q.
    Which attack relies on psychological manipulation rather than technical exploitation?
    A.
    Social engineering
    edit question Clone to My Questions
    Question 8
    Q.
    Which CIA principle is MOST directly supported by having regular, tested backups?
    A.
    Availability
    edit question Clone to My Questions
    Question 9
    Q.
    What PPT element is responsible for user security training?
    A.
    People
    edit question Clone to My Questions
  • Round 3
  • Question 1
    Q.
    What type of threat involves a trusted user misusing access?
    A.
    Insider threat
    edit question Clone to My Questions
    Question 2
    Q.
    What security principle ensures users only have the access required for their role?
    A.
    Least privilege
    edit question Clone to My Questions
    Question 3
    Q.
    An organisation has strong firewalls and antivirus but still suffers frequent breaches. Which weakness is MOST likely?
    A.
    Poor user awareness
    edit question Clone to My Questions
    Question 4
    Q.
    Which of the following is best classified as a process control rather than a technical control?
    A.
    Patch management
    edit question Clone to My Questions
    Question 5
    Q.
    What type of malware records keystrokes without the user’s knowledge?
    A.
    Keylogger
    edit question Clone to My Questions
    Question 6
    Q.
    What attack prevents legitimate users from accessing a system by flooding it with traffic?
    A.
    Denial of service
    edit question Clone to My Questions
    Question 7
    Q.
    What is the MAIN purpose of encryption?
    A.
    Protect data from being read
    edit question Clone to My Questions
    Question 8
    Q.
    Which failure would MOST likely cause long-term data loss?
    A.
    No backups
    edit question Clone to My Questions
    Question 9
    Q.
    What process defines how systems are restored after failure?
    A.
    Disaster recovery
    edit question Clone to My Questions
  • Round 4
  • Question 1
    Q.
    What type of network threat silently monitors traffic without disrupting systems?
    A.
    Passive threat
    edit question Clone to My Questions
    Question 2
    Q.
    Which law makes unauthorised access to computer systems a criminal offence in the UK?
    A.
    Computer Misuse Act
    edit question Clone to My Questions
    Question 3
    Q.
    What type of attack intercepts communication between two systems?
    A.
    Man in the middle
    edit question Clone to My Questions
    Question 4
    Q.
    Which CIA principle is MOST likely to lead to legal consequences if it fails?
    A.
    Confidentiality
    edit question Clone to My Questions
    Question 5
    Q.
    Who is legally responsible for protecting personal data under GDPR?
    A.
    The organisation
    edit question Clone to My Questions
    Question 6
    Q.
    What do attackers exploit in order for a threat to succeed?
    A.
    Vulnerability
    edit question Clone to My Questions
    Question 7
    Q.
    What term describes the combination of threat and vulnerability?
    A.
    Risk
    edit question Clone to My Questions
    Question 8
    Q.
    What attack type overloads systems using many connected devices?
    A.
    Distributed Denial of Service
    edit question Clone to My Questions
    Question 9
    Q.
    Why are passive network attacks often more dangerous long-term?
    A.
    They can go undetected for long periods
    edit question Clone to My Questions
  • Round 5
  • Question 1
    Q.
    What type of document sets rules for how staff may use IT systems?
    A.
    Acceptable Use Policy
    edit question Clone to My Questions
    Question 2
    Q.
    What access control model assigns permissions to job roles?
    A.
    Role based access
    edit question Clone to My Questions
    Question 3
    Q.
    What server authenticates users in a Windows domain?
    A.
    Domain Controller
    edit question Clone to My Questions
    Question 4
    Q.
    Which security tool would alert administrators to suspicious activity but NOT stop it?
    A.
    Intrusion Detection System
    edit question Clone to My Questions
    Question 5
    Q.
    Why are procedures essential for patch management?
    A.
    They ensure updates are tested, scheduled, and applied consistently
    edit question Clone to My Questions
    Question 6
    Q.
    What type of antivirus detection compares files to known malware patterns?
    A.
    Signature based detection
    edit question Clone to My Questions
    Question 7
    Q.
    What antivirus technique looks for suspicious behaviour rather than known code?
    A.
    Heuristic detection
    edit question Clone to My Questions
    Question 8
    Q.
    What network component allows different services to communicate using numbers such as 80 or 443?
    A.
    Port
    edit question Clone to My Questions
    Question 9
    Q.
    What document explains the step-by-step actions staff must follow to carry out a policy?
    A.
    Procedure
    edit question Clone to My Questions
Colors :
Font color
Button color
Background color
Select Font
Logo:
i
Ideal size for logo: 200x140px
Max file size: 10MB
photo
Background Image:
i
Ideal size for background: 1920x1080px
Max file size: 10MB
Recommended: High contrast images
photo
Theme Song:
Combined Shape
Team Door
0
Combined-Shape
Team Window
0
Round 1
Round 2
Round 3
Round 4
Round 5
Round 1
Round 2
Round 3
Round 4
Round 5
Round 6
Round 7
Round 8
Round 9
Round 10
Round 11
Round 12
Round 13
Round 14
Round 15
Round 16
Round 17
Round 18
Round 19
Round 20
Round 21
Round 22
Round 23
Round 24
Round 25
Round 26
Round 27
Round 28
Round 29
Round 30
Round 31
Round 32
Round 33
Round 34
Round 35
Round 36
Round 37
Round 38
Round 39
Round 40
Round 41
Round 42
Round 43
Round 44
Round 45
Combined Shape
Team Door
0
1
2
3
4
5
6
7
8
9
Combined-Shape
Team Window
0
Question
Team 0
Team 0
0
Team 0
Team 0
Question
A  Answer 1
B  Answer 2
C  Answer 3
D  Answer 4
Number of Teams
1
2
3
4
Team Names
1
Team color
2
Team color

Is it good, bad, wrong, etc?