In the CIA Triad, "Confidentiality" means ensuring that data is:
Quiz 1 - Malicious Software

Quiz
•
Computers
•
University
•
Hard

Ovidiu Stan
Used 32+ times
FREE Resource
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
available and that people can access it
not accessible by unwanted parties
accessible anonymously
accurate and was not tampered with
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the CIA Triad, "Integrity" means ensuring that data is:
available and that people can access it
not accessible by unwanted parties
trhuthful and honest
accurate and was not tampered with
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the CIA Triad, "Availability" means ensuring that data is:
available to anyone from anywhere
not accessible by unwanted parties
available and people can access it
accurate and was not tampered with
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What's the relationship between a vulnerability and an exploit?
An exploit takes advantages of a vulnerability to run arbitrary code or gain access
A vulnerability takes advantages of an exploit to run arbitrary code or gain access
They're unrelated
An exploit creates a vulnerability in a system
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement is true for both a worm and a virus?
They don't cause any harm to the target system.
They're self-replicating and self-propagating.
They're undetectable by antimalware software.
They infect other files with malicious code.
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Check all examples of types of malware:
Adware
Worms
Key Generators
Viruses
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are the characteristics of a rootkit? Check all that apply.
Provides elevated credentials
Is harmless
is difficult to detect
Is destructive
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Chapter 7: Network Security: Firewall, Antivirus, and Encryption

Quiz
•
University
10 questions
Unit 3 - 2.4.8 DoS & DDoS

Quiz
•
9th Grade - University
14 questions
cyber security

Quiz
•
KG - Professional Dev...
10 questions
Lesson 2 - Passing Data to Subsystems

Quiz
•
University
11 questions
Cross-Site Request Forgery

Quiz
•
University
18 questions
SRWE-Refreshing Activity

Quiz
•
University
15 questions
L7: Cybersecurity Threats Quiz

Quiz
•
University
15 questions
IAS - Lesson 1

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade