Cybersecurity Terminology Quiz Part 1

Cybersecurity Terminology Quiz Part 1

University

15 Qs

quiz-placeholder

Similar activities

Activity 1 - IAS 101

Activity 1 - IAS 101

University

12 Qs

Online Privacy

Online Privacy

University

20 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

SYO 701 EDR Module FC

SYO 701 EDR Module FC

University

20 Qs

CHAPTER 2: Developing Your Security Policy

CHAPTER 2: Developing Your Security Policy

University

11 Qs

AQA Consequence of the Use of Computing

AQA Consequence of the Use of Computing

11th Grade - University

17 Qs

CS180-C7&8

CS180-C7&8

University

12 Qs

L7 MSC Network Security Quiz

L7 MSC Network Security Quiz

University

17 Qs

Cybersecurity Terminology Quiz Part 1

Cybersecurity Terminology Quiz Part 1

Assessment

Quiz

Computers

University

Medium

Created by

Harrold Ventayen

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Advanced persistent threats typically require high levels of expertise and substantial resources to execute. Is this statement true or false?

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authentication is the process of verifying the identity of a user, process, device, and network.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Access control is defined as the process of granting or denying specific requests to obtain and use information and related information processing services.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the methodology that assumes no knowledge of the internal structure and implementation detail of the assessment object?

Blacklist

Breach

Continuous Monitoring

Black Box Testing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a list of entities that are blocked or denied privileges or access?

Blacklist

Breach

Cryptography

Data Loss

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the compromise of security that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to protected information?

Breach

Compromise

Confidentiality

Decryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the violation of the security policy of a system such that an unauthorized disclosure, modification, or destruction of sensitive information has occurred?

Continuous Monitoring

Critical Infrastructure

Compromise

Digital Forensics

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?