Cybersecurity

Cybersecurity

University

30 Qs

quiz-placeholder

Similar activities

Jan21 CS Group 1 Revision Part 2: Chapters 7, 8 and 9

Jan21 CS Group 1 Revision Part 2: Chapters 7, 8 and 9

University

25 Qs

007_Zero Trust - CompTIA Security+ SY0-701 - 1.2

007_Zero Trust - CompTIA Security+ SY0-701 - 1.2

12th Grade - University

27 Qs

security+ (601)

security+ (601)

9th Grade - Professional Development

25 Qs

Cybersecurity attack types

Cybersecurity attack types

9th Grade - University

30 Qs

HCI - Chapter 3

HCI - Chapter 3

University

30 Qs

Computer Security & Privacy

Computer Security & Privacy

University

34 Qs

Профессиональная иностранная терминология_6

Профессиональная иностранная терминология_6

University

25 Qs

006_Gap Analysis1.2

006_Gap Analysis1.2

12th Grade - University

27 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Computers

University

Medium

Created by

Vincent Teh

Used 3+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term vulnerability mean?

a weakness that makes a target susceptible to an attack

a known target or victim machine

a method of attack to exploit a target

a potential threat that a hacker creates

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

DoS

spoof

DDoS

ping sweep

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which workforce framework category includes highly specialized review and evaluation of incoming cybersecurity info?

Securely Provision

Protect and Defend

Oversight and Development

Analyze

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a valid state of data?

in-progress

in-process

in-moving

in-termination

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method helps to ensure data integrity?

hashing

repudiation

availability

security camera

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What service determines which resources a user can access along with the operations that a user can perform?

accounting

authentication

authorization

biometric

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is a common hash function?

Blowfish

MD5

RSA

SHA

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?