Info Security

Info Security

University - Professional Development

10 Qs

quiz-placeholder

Similar activities

W0D3  Quizzizz for OW

W0D3 Quizzizz for OW

Professional Development

10 Qs

Quiz Time

Quiz Time

University

11 Qs

Test n°7 (Economie) BTS : Concurrence et défaillances de marché

Test n°7 (Economie) BTS : Concurrence et défaillances de marché

University

10 Qs

LIVE QUIZ - SDG 4, 5 AND 6

LIVE QUIZ - SDG 4, 5 AND 6

University

15 Qs

Beneficial Ownership

Beneficial Ownership

Professional Development

10 Qs

SALES G's & S's

SALES G's & S's

University

9 Qs

FNSINC612 Practice 3

FNSINC612 Practice 3

University

15 Qs

Simulacro 1 2023 II

Simulacro 1 2023 II

University

15 Qs

Info Security

Info Security

Assessment

Quiz

Other, Education

University - Professional Development

Practice Problem

Medium

Created by

Paul Paglinawan

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Which of the following is not part of the potential consequence after a cybersecurity attack?

Profit loss

Intellectual Property Loss

Reputational Damage

Positive publicity

2.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

This is the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.

Availability

Information Security

Integrity

Vulnerability Management

3.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

CIA Triad: ______ is when an information is available only to authorized entities.

Confidentiality

Conditional

Integrity

Availability

4.

MULTIPLE CHOICE QUESTION

10 sec • 10 pts

CIA Triad: ______ is when an information is accessible by authorized entities when needed.

Confidentiality

Confidence

Availability

Integrity

5.

MULTIPLE CHOICE QUESTION

20 sec • 15 pts

_____ is an approach to cybersecurity in which a series of defensive mechanisms are layered in order to protect valuable data and information.

Best Practices

DDoS Attack

DOS Attack

Defense-in-depth

6.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

A type of threat actor which primary motivation is ideological belief.

Thrill-seekers

Hacktivists

Insider Threats

Script-Kiddies

7.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

This is defined as a malicious software designed to infiltrate, spy on, or create a backdoor to control systems or data.

Malware

Man-in-the-middle

Bruce force

DDoS

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?