
Cybersecurity Terminology Quiz Part 2
Authored by Harrold Ventayen
Other
University
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the definition of interoperability?
The ability of one set of entities to physically connect to and logically communicate with another set of entities.
A security event in which an intruder gains unauthorized access to a system.
Authentication using two or more different factors.
An update to correct particular problems with software.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the definition of intrusion?
The ability of one set of entities to physically connect to and logically communicate with another set of entities.
A security event in which an intruder gains unauthorized access to a system.
Authentication using two or more different factors.
An update to correct particular problems with software.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Is intrusion detection and prevention the process of monitoring events in a computer system or network, analyzing them for signs of possible incidents, and attempting to stop detected possible incidents?
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the definition of malware?
The ability of one set of entities to physically connect to and logically communicate with another set of entities.
A security event in which an intruder gains unauthorized access to a system.
The process of monitoring events in a computer system or network, analyzing them for signs of possible incidents, and attempting to stop detected possible incidents.
A program that is inserted into a system with the intent of compromising the confidentiality, integrity, or availability of the victim's data.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the definition of multifactor authentication?
The ability of one set of entities to physically connect to and logically communicate with another set of entities.
A security event in which an intruder gains unauthorized access to a system.
Authentication using two or more different factors.
A program that is inserted into a system with the intent of compromising the confidentiality, integrity, or availability of the victim's data.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and the additional safeguards that mitigate this impact?
Risk analysis
Risk assessment
Scanning
Spear Phishing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the process of identifying, estimating, and prioritizing risks to organizational operations resulting from the operation of an information system?
Risk analysis
Risk assessment
Spoofing
Structured Query Language (SQL) injection
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?