You are on page 1of 1

Proposed questions for the Self-Quiz Unit 7

Q1. A malicious software breaches networks through a vulnerability, like clicking on


suspicious email links it is identified as.
1. Phishing
2. Malware
3. Spamming
4. Distributed Denial of Service
Q2. When criminals insert themselves between a public Wi-Fi and an individual’s device.
Without a protected Wi-Fi connection, it is identified as.
1. e-skimming
2. SQL Injection
3. Man-in-the-Middle attack
4. Zero-day attack
Q3. The maximum tolerable period in which data might be lost due to a major incident is
termed as.
1. Recovery Point Objective (RPO)
2. Recovery Time Objective (RTO)
3. Maximum Allowable Downtime (MAD)
4. Work Recovery Time (WRT)
Q4. The absolute maximum time in which a business process can be unavailable without
significant ramifications to the institution is termed as.
1. Recovery Point Objective (RPO)
2. Recovery Time Objective (RTO)
3. Maximum Allowable Downtime (MAD)
4. Work Recovery Time (WRT)

Note:
1. Questions are formulated from the readings given in the reading assignment of the
learning guide.
2. Option made bold is the correct answer to the question.

You might also like