1.2 Attacking and Defending

1.2 Attacking and Defending

University

16 Qs

quiz-placeholder

Similar activities

Mengenal Jendela dan Ikon Microsoft Excel

Mengenal Jendela dan Ikon Microsoft Excel

7th Grade - University

15 Qs

Chapter 2: Input Device

Chapter 2: Input Device

12th Grade - University

12 Qs

Financial Services Basics

Financial Services Basics

9th Grade - Professional Development

14 Qs

Fun with Computer Architecture

Fun with Computer Architecture

University

15 Qs

ĐC CNTT_Chương 1

ĐC CNTT_Chương 1

University

20 Qs

C Programming Unit-1 Test-2

C Programming Unit-1 Test-2

University

20 Qs

TEST1.PY

TEST1.PY

10th Grade - University

20 Qs

Information System and Modern Organization part 1

Information System and Modern Organization part 1

University

14 Qs

1.2 Attacking and Defending

1.2 Attacking and Defending

Assessment

Quiz

Computers, Instructional Technology, Business

University

Practice Problem

Medium

Created by

Aviciena Santoso

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

16 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Cybersecurity consists of two things. First, ______ threats,

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Cybersecurity also consists of _______ risks.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Virtualbox is

a software solution that allows you to simulate a box in 3d

a security model where the organization is a castle, and everything else is dangerous

software that allows you to run one (or more) operating systems within a single device

a development environment that allows you to deploy boxes (servers) quickly after coding

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Vagrant in the context of cybersecurity?

A person without a settled home or regular work who wanders from place to place and lives by begging.

A tool made by Microsoft that allows you to host virtual machines on the cloud.

A SaaS platform that sets up virtual machines for you.

A tool that helps you create and manage virtual environments on your local machine.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym CIA stand for in cybersecurity?

Confidentiality, Integration, Accessibility

Central, Intelligence, Agency

Confidentiality, Integrity, Assessability

Confidentiality, Integrity, Accessability

6.

OPEN ENDED QUESTION

30 sec • 1 pt

In your own words, what is a definition for "Confidentiality"?

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

30 sec • 1 pt

In your own words, what is a definition for "Integrity"?

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?