Cybersecurity Terminology Quiz Part 2

Cybersecurity Terminology Quiz Part 2

University

15 Qs

quiz-placeholder

Similar activities

IT RSK & AUDIT

IT RSK & AUDIT

University

10 Qs

Risk Management Planning

Risk Management Planning

University

10 Qs

ELE_OA

ELE_OA

University

15 Qs

Portfolio Theory and Analysis

Portfolio Theory and Analysis

University

10 Qs

Dead Rails Quiz

Dead Rails Quiz

University

15 Qs

Wildfire problems: Bucket Solutions

Wildfire problems: Bucket Solutions

KG - Professional Development

10 Qs

Review of Biosafety, Biosecurity and Biorisk Management

Review of Biosafety, Biosecurity and Biorisk Management

University

20 Qs

Presentation and Disclosure_1C

Presentation and Disclosure_1C

University

11 Qs

Cybersecurity Terminology Quiz Part 2

Cybersecurity Terminology Quiz Part 2

Assessment

Quiz

Other

University

Easy

Created by

Harrold Ventayen

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of interoperability?

The ability of one set of entities to physically connect to and logically communicate with another set of entities.

A security event in which an intruder gains unauthorized access to a system.

Authentication using two or more different factors.

An update to correct particular problems with software.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of intrusion?

The ability of one set of entities to physically connect to and logically communicate with another set of entities.

A security event in which an intruder gains unauthorized access to a system.

Authentication using two or more different factors.

An update to correct particular problems with software.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is intrusion detection and prevention the process of monitoring events in a computer system or network, analyzing them for signs of possible incidents, and attempting to stop detected possible incidents?

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of malware?

The ability of one set of entities to physically connect to and logically communicate with another set of entities.

A security event in which an intruder gains unauthorized access to a system.

The process of monitoring events in a computer system or network, analyzing them for signs of possible incidents, and attempting to stop detected possible incidents.

A program that is inserted into a system with the intent of compromising the confidentiality, integrity, or availability of the victim's data.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of multifactor authentication?

The ability of one set of entities to physically connect to and logically communicate with another set of entities.

A security event in which an intruder gains unauthorized access to a system.

Authentication using two or more different factors.

A program that is inserted into a system with the intent of compromising the confidentiality, integrity, or availability of the victim's data.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and the additional safeguards that mitigate this impact?

Risk analysis

Risk assessment

Scanning

Spear Phishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of identifying, estimating, and prioritizing risks to organizational operations resulting from the operation of an information system?

Risk analysis

Risk assessment

Spoofing

Structured Query Language (SQL) injection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?