Part 2: Questions 16–30

  1. What does a cyber-crisis simulation in a course like CERT’s aim to achieve?
    • a) Teach programming skills
    • b) Prepare professionals for managing real-world cyber incidents
    • c) Develop new encryption algorithms
    • d) Train employees in hardware maintenance
  2. Which of the following is a key feature of India’s Personal Data Protection Bill?
    • a) Mandatory use of cloud storage
    • b) Protection of personal data and privacy rights
    • c) Elimination of all cybersecurity audits
    • d) Restriction of international data transfers
  3. What is a potential risk of third-party vendors in a global firm?
    • a) Improved employee morale
    • b) Introduction of cybersecurity vulnerabilities
    • c) Reduced operational costs
    • d) Faster software development
  4. Which step follows the containment of a cyber breach?
    • a) Paying the attacker
    • b) Assessing the scope of the damage
    • c) Ignoring the incident
    • d) Deleting all backups
  5. What is a benefit of employee training in cybersecurity?
    • a) Increased software development speed
    • b) Reduced likelihood of phishing-related breaches
    • c) Elimination of all cyber threats
    • d) Lower hardware costs
  6. Which provider offers cyber insurance in India?
    • a) Bajaj Allianz
    • b) Life Insurance Corporation of India
    • c) State Bank of India
    • d) Reliance Industries
  7. What is a key challenge of complying with GDPR for a firm operating in India?
    • a) Lack of internet access
    • b) Ensuring data protection for EU citizens’ data
    • c) Reducing employee salaries
    • d) Limiting office locations
  8. How can AI be used by cybercriminals?
    • a) To reduce attack frequency
    • b) To create advanced phishing and malware attacks
    • c) To improve data encryption
    • d) To train employees
  9. What is a recommended action to prepare for quantum computing threats?
    • a) Ignore quantum developments
    • b) Invest in quantum-resistant encryption
    • c) Reduce data storage
    • d) Eliminate cloud services
  10. Which of the following is part of the NIST Cybersecurity Framework?
    • a) Identify, Protect, Detect, Respond, Recover
    • b) Plan, Do, Check, Act
    • c) Input, Process, Output, Storage
    • d) Design, Build, Test, Deploy
  11. What is a key role of CERT-In in India?
    • a) Developing mobile applications
    • b) Issuing cybersecurity guidelines and incident reporting protocols
    • c) Managing corporate taxes
    • d) Providing employee healthcare
  12. Which Middle Eastern country has the Personal Data Protection Law (PDPL)?
    • a) Saudi Arabia
    • b) Qatar
    • c) Kuwait
    • d) Oman
  13. What is a common outcome of a successful ransomware attack?
    • a) Improved system performance
    • b) Locked systems until a ransom is paid
    • c) Enhanced data encryption
    • d) Increased employee productivity
  14. Which of the following is a focus of the Udemy “Cybersecurity for Managers” course?
    • a) Advanced network programming
    • b) Managerial perspective on risk assessment
    • c) Hardware troubleshooting
    • d) Legal contract drafting
  15. Why is data minimization important for compliance with global privacy laws?
    • a) It increases data storage costs
    • b) It reduces the risk of data breaches by limiting data collection
    • c) It eliminates the need for encryption
    • d) It restricts employee access to systems
Cybersecurity Awareness Quiz Continues on Next Page

Pages: 1 2 3 4