A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

Professional Development

27 Qs

quiz-placeholder

Similar activities

#01.01 Foundations of Cybersecurity Module 1

#01.01 Foundations of Cybersecurity Module 1

Professional Development

24 Qs

IT AUDIT PROCESS

IT AUDIT PROCESS

Professional Development

25 Qs

SSDLC

SSDLC

Professional Development

28 Qs

CompTIA Security+ Certification Exam SY0-701 Practice Test 1

CompTIA Security+ Certification Exam SY0-701 Practice Test 1

Professional Development

25 Qs

AI in Cybersecurity

AI in Cybersecurity

Professional Development

27 Qs

security+ (601)

security+ (601)

9th Grade - Professional Development

25 Qs

Lesson 5.1 InfoSec Risk Management Basics

Lesson 5.1 InfoSec Risk Management Basics

Professional Development

28 Qs

A+ 1102 Day 4b ITSA 2.2 Compare wireless sec protocols and Auth

A+ 1102 Day 4b ITSA 2.2 Compare wireless sec protocols and Auth

Professional Development

29 Qs

A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

Assessment

Passage

Computers

Professional Development

Hard

Created by

Brock McKinley

FREE Resource

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three properties of secure information, according to the CIA triad?

Confidentiality, integrity, and authentication

Confidentiality, integrity, and availability

Confidentiality, accessibility, and authenticity

Confidentiality, reliability, and authorization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term specifically refers to controls that protect against attacks on computer storage and processing systems?

Information security

Cybersecurity

Network security

Data encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of hardening a system?

To make it more user-friendly

To increase its attack surface

To make it more secure

To reduce its accessibility

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a vulnerability?

A potential threat actor

A security policy

A weakness that could be exploited

A secure configuration

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack relies on obtaining information about the network and its security controls?

Footprinting

Spoofing

Phishing

Shoulder surfing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a cryptographic hash?

To encrypt data

To verify data integrity

To generate a digital signature

To exchange encryption keys

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of encryption uses a single secret key for both encryption and decryption?

Asymmetric encryption

Triple DES

Symmetric encryption

RSA encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?