A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

Professional Development

27 Qs

quiz-placeholder

Similar activities

JS QUİZ

JS QUİZ

Professional Development

23 Qs

Computing Test

Computing Test

KG - Professional Development

23 Qs

SQL Exam

SQL Exam

Professional Development

23 Qs

Ice Breaker

Ice Breaker

University - Professional Development

25 Qs

ITS 101 14 Review

ITS 101 14 Review

10th Grade - Professional Development

25 Qs

crm

crm

Professional Development

25 Qs

Quiz Test 02

Quiz Test 02

Professional Development

26 Qs

safety in ict

safety in ict

Professional Development

23 Qs

A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

Assessment

Passage

Computers

Professional Development

Practice Problem

Hard

Created by

Brock McKinley

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three properties of secure information, according to the CIA triad?

Confidentiality, integrity, and authentication

Confidentiality, integrity, and availability

Confidentiality, accessibility, and authenticity

Confidentiality, reliability, and authorization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term specifically refers to controls that protect against attacks on computer storage and processing systems?

Information security

Cybersecurity

Network security

Data encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of hardening a system?

To make it more user-friendly

To increase its attack surface

To make it more secure

To reduce its accessibility

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a vulnerability?

A potential threat actor

A security policy

A weakness that could be exploited

A secure configuration

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack relies on obtaining information about the network and its security controls?

Footprinting

Spoofing

Phishing

Shoulder surfing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a cryptographic hash?

To encrypt data

To verify data integrity

To generate a digital signature

To exchange encryption keys

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of encryption uses a single secret key for both encryption and decryption?

Asymmetric encryption

Triple DES

Symmetric encryption

RSA encryption

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?