Deloitte Cyber Security Quiz-2

Question 1

Time: 00:00:00
What does the term "Two Factor Authentication" mean?


Using two different types of encryption

Using two different types of encryption

Using two different antivirus programs

Using two different antivirus programs

Authenticating with two different devices or methods

Authenticating with two different devices or methods

Changing passwords twice a day

Changing passwords twice a day

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 2

Time: 00:00:00
What is the main purpose of a honeypot in cybersecurity?


Detect and deflect malicious activities

Detect and deflect malicious activities

Speed up internet connections

Speed up internet connections

Block access to a network

Block access to a network

Attract bees and insects

Attract bees and insects

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 3

Time: 00:00:00
What type of attack involves an attacker intercepting communication between two parties?

Spoofing

Spoofing

DDoS

DDoS

Brute force

Brute force

Eavesdropping

Eavesdropping

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 4

Time: 00:00:00
What is the purpose of antivirus software?

Encrypt data

Encrypt data

Enhance device aesthetics

Enhance device aesthetics

Block network access

Block network access

Detect and remove malicious software

Detect and remove malicious software

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 5

Time: 00:00:00
What is the first step in the cybersecurity risk management process?

Risk assessment

Risk assessment

Risk acceptance

Risk acceptance

Risk analysis

Risk analysis

Risk mitigation

Risk mitigation

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 6

Time: 00:00:00
What is the purpose of a security policy in an organization?


Increase network speed

Increase network speed

Define rules and guidelines for secure practices

Define rules and guidelines for secure practices

Encrypt all data

Encrypt all data

Enhance device aesthetics

Enhance device aesthetics

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 7

Time: 00:00:00
What does the term "Biometric Authentication" involve?

Something you know

Something you know

Something you have

Something you have

Something you love

Something you love

Something you are

Something you are

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 8

Time: 00:00:00
What is the role of a security audit in cybersecurity?

Increase vulnerability to attacks

Increase vulnerability to attacks

Block unauthorized access

Block unauthorized access

Enhance internet speed

Enhance internet speed

Assess and improve the security of a system

Assess and improve the security of a system

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 9

Time: 00:00:00
Which of the following is a common social engineering technique?

Encryption

Encryption

Firewall

Firewall

Spear phishing

Spear phishing

Brute force attack

Brute force attack

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 10

Time: 00:00:00
What is the purpose of a penetration test?


Increase network speed

Increase network speed

Identify and exploit vulnerabilities to improve security

Identify and exploit vulnerabilities to improve security

Enhance device aesthetics

Enhance device aesthetics

Block unauthorized access

Block unauthorized access

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

["0","40","60","80","100"]
["Need more practice!","Keep trying!","Not bad!","Good work!","Perfect!"]

Personalized Analytics only Availble for Logged in users

Analytics below shows your performance in various Mocks on PrepInsta

Your average Analytics for this Quiz

Rank

-

Percentile

0%

Completed

0/10

Accuracy

0%

Get Prepinsta Prime

Get all 200+ courses offered by Prepinsta

Never Miss an OffCampus Update

Get OffCampus Updates on Social Media from PrepInsta

Follow us on our Media Handles, we post out OffCampus drives on our Instagram, Telegram, Discord, Whatsdapp etc.

Get Hiring Updates
Amazon,Google,Delottie & 30+companies are hiring ! Get hiring Updates right in your inbox from PrepInsta

Get over 200+ course One Subscription

Courses like AI/ML, Cloud Computing, Ethical Hacking, C, C++, Java, Python, DSA (All Languages), Competitive Coding (All Languages), TCS, Infosys, Wipro, Amazon, DBMS, SQL and others.

Get over 200+ course One Subscription

Courses like AI/ML, Cloud Computing, Ethical Hacking, C, C++, Java, Python, DSA (All Languages), Competitive Coding (All Languages), TCS, Infosys, Wipro, Amazon, DBMS, SQL and others.

Get PrepInsta Prime Subscription

Get access to all the courses that PrepInsta offers, check the out below -

Companies

TCS, Cognizant, Delloite, Infosys, Wipro, CoCubes, KPMG, Amazone, ZS Associates, Accenture, Congnizant & other 50+ companies

Programming

Data Structures, Top 500 Codes, C, C++, Java Python & other 10+ subjects

Skills

Full Stack Web Development, Data Science, Machine Learning, AWS Cloud, & other 10+ skills and 20+ projects