Skip to content
Part 2: Questions 16–30
- What does a cyber-crisis simulation in a course like CERT’s aim to achieve?
- a) Teach programming skills
- b) Prepare professionals for managing real-world cyber incidents
- c) Develop new encryption algorithms
- d) Train employees in hardware maintenance
- Which of the following is a key feature of India’s Personal Data Protection Bill?
- a) Mandatory use of cloud storage
- b) Protection of personal data and privacy rights
- c) Elimination of all cybersecurity audits
- d) Restriction of international data transfers
- What is a potential risk of third-party vendors in a global firm?
- a) Improved employee morale
- b) Introduction of cybersecurity vulnerabilities
- c) Reduced operational costs
- d) Faster software development
- Which step follows the containment of a cyber breach?
- a) Paying the attacker
- b) Assessing the scope of the damage
- c) Ignoring the incident
- d) Deleting all backups
- What is a benefit of employee training in cybersecurity?
- a) Increased software development speed
- b) Reduced likelihood of phishing-related breaches
- c) Elimination of all cyber threats
- d) Lower hardware costs
- Which provider offers cyber insurance in India?
- a) Bajaj Allianz
- b) Life Insurance Corporation of India
- c) State Bank of India
- d) Reliance Industries
- What is a key challenge of complying with GDPR for a firm operating in India?
- a) Lack of internet access
- b) Ensuring data protection for EU citizens’ data
- c) Reducing employee salaries
- d) Limiting office locations
- How can AI be used by cybercriminals?
- a) To reduce attack frequency
- b) To create advanced phishing and malware attacks
- c) To improve data encryption
- d) To train employees
- What is a recommended action to prepare for quantum computing threats?
- a) Ignore quantum developments
- b) Invest in quantum-resistant encryption
- c) Reduce data storage
- d) Eliminate cloud services
- Which of the following is part of the NIST Cybersecurity Framework?
- a) Identify, Protect, Detect, Respond, Recover
- b) Plan, Do, Check, Act
- c) Input, Process, Output, Storage
- d) Design, Build, Test, Deploy
- What is a key role of CERT-In in India?
- a) Developing mobile applications
- b) Issuing cybersecurity guidelines and incident reporting protocols
- c) Managing corporate taxes
- d) Providing employee healthcare
- Which Middle Eastern country has the Personal Data Protection Law (PDPL)?
- a) Saudi Arabia
- b) Qatar
- c) Kuwait
- d) Oman
- What is a common outcome of a successful ransomware attack?
- a) Improved system performance
- b) Locked systems until a ransom is paid
- c) Enhanced data encryption
- d) Increased employee productivity
- Which of the following is a focus of the Udemy “Cybersecurity for Managers” course?
- a) Advanced network programming
- b) Managerial perspective on risk assessment
- c) Hardware troubleshooting
- d) Legal contract drafting
- Why is data minimization important for compliance with global privacy laws?
- a) It increases data storage costs
- b) It reduces the risk of data breaches by limiting data collection
- c) It eliminates the need for encryption
- d) It restricts employee access to systems
Cybersecurity Awareness Quiz Continues on Next Page
Pages: 1 2 3 4