Vulnerability Assessment

Vulnerability Assessment

15 Qs

quiz-placeholder

Similar activities

Security

Security

9th Grade

15 Qs

08 - Protecting Yourself QUIZ

08 - Protecting Yourself QUIZ

9th - 12th Grade

17 Qs

OCR IT. Unit 3 - Cyber Security. LO2 test:

OCR IT. Unit 3 - Cyber Security. LO2 test:

11th - 12th Grade

20 Qs

Cybersecurity Basics Quiz

Cybersecurity Basics Quiz

6th Grade

14 Qs

Securing Your Identity: MFA Edition

Securing Your Identity: MFA Edition

University

15 Qs

ITBP301_Chapter 06

ITBP301_Chapter 06

University

10 Qs

CIA Triad Quiz

CIA Triad Quiz

University

20 Qs

cyber security

cyber security

9th Grade

11 Qs

Vulnerability Assessment

Vulnerability Assessment

Assessment

Quiz

Computers

Hard

Created by

Avinash Borse

Used 17+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary need of information security related to confidentiality?

Data secrecy

Data availability

Data authenticity

Data integrity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of information that needs to be protected for confidentiality?

Email address

Employee ID number

Public holiday calendar

Office address

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves interception of network packets to gain unauthorized access to information flowing on the network?

Data diddling attacks

Salami attacks

Packet sniffing

Trust relationship attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Integrity principle in information security refer to?

Data availability

Data authenticity

Data quality

Data confidentiality

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves making a target system unresponsive by sending a large number of synchronous requests?

Electrical power attacks

DDOS attacks

Syn flood attacks

Server room environment attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in the interaction with a system before authentication?

Access control

Accountability

Identification

Authorization

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which factor used for authentication is the most important but also the easiest to compromise?

Something you know

Something you are

Somewhere you are

Something you have

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?