Cybersecurity Terminology Quiz Part 2

Cybersecurity Terminology Quiz Part 2

University

15 Qs

quiz-placeholder

Similar activities

Oshad-sf

Oshad-sf

University

14 Qs

TOPIC 7 : BASIC CONCEPTUAL AND REGULATORY FRAMEWORK

TOPIC 7 : BASIC CONCEPTUAL AND REGULATORY FRAMEWORK

University

20 Qs

D6AD A_DBMS_CA1_Quiz1_24-25

D6AD A_DBMS_CA1_Quiz1_24-25

University

20 Qs

Case 3: SEWMEX

Case 3: SEWMEX

University

11 Qs

Q1: Conceptual Framework for Financial Reporting 2018

Q1: Conceptual Framework for Financial Reporting 2018

8th Grade - University

20 Qs

MIS 430 Test 3 Review

MIS 430 Test 3 Review

University

14 Qs

COMP 20243

COMP 20243

University

10 Qs

Software Project Management Quiz

Software Project Management Quiz

University

10 Qs

Cybersecurity Terminology Quiz Part 2

Cybersecurity Terminology Quiz Part 2

Assessment

Quiz

Other

University

Easy

Created by

Harrold Ventayen

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of interoperability?

The ability of one set of entities to physically connect to and logically communicate with another set of entities.

A security event in which an intruder gains unauthorized access to a system.

Authentication using two or more different factors.

An update to correct particular problems with software.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of intrusion?

The ability of one set of entities to physically connect to and logically communicate with another set of entities.

A security event in which an intruder gains unauthorized access to a system.

Authentication using two or more different factors.

An update to correct particular problems with software.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is intrusion detection and prevention the process of monitoring events in a computer system or network, analyzing them for signs of possible incidents, and attempting to stop detected possible incidents?

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of malware?

The ability of one set of entities to physically connect to and logically communicate with another set of entities.

A security event in which an intruder gains unauthorized access to a system.

The process of monitoring events in a computer system or network, analyzing them for signs of possible incidents, and attempting to stop detected possible incidents.

A program that is inserted into a system with the intent of compromising the confidentiality, integrity, or availability of the victim's data.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of multifactor authentication?

The ability of one set of entities to physically connect to and logically communicate with another set of entities.

A security event in which an intruder gains unauthorized access to a system.

Authentication using two or more different factors.

A program that is inserted into a system with the intent of compromising the confidentiality, integrity, or availability of the victim's data.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and the additional safeguards that mitigate this impact?

Risk analysis

Risk assessment

Scanning

Spear Phishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of identifying, estimating, and prioritizing risks to organizational operations resulting from the operation of an information system?

Risk analysis

Risk assessment

Spoofing

Structured Query Language (SQL) injection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?