cybersecurity week 1 day 2

cybersecurity week 1 day 2

Professional Development

22 Qs

quiz-placeholder

Similar activities

Konde technology quiz - Do you know your educational Apps?

Konde technology quiz - Do you know your educational Apps?

Professional Development

21 Qs

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

Google Educator Level 1_Sheets Quiz

Google Educator Level 1_Sheets Quiz

Professional Development

19 Qs

Fundamentos Azure - Clase 1

Fundamentos Azure - Clase 1

Professional Development

20 Qs

Undertale Quiz

Undertale Quiz

Professional Development

17 Qs

Identity Theft , Scams & Phishing

Identity Theft , Scams & Phishing

Professional Development

18 Qs

BCS Systems & Architecture Quiz 1

BCS Systems & Architecture Quiz 1

University - Professional Development

20 Qs

FLOWER

FLOWER

Professional Development

17 Qs

cybersecurity week 1 day 2

cybersecurity week 1 day 2

Assessment

Quiz

Instructional Technology

Professional Development

Practice Problem

Hard

Created by

P P

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Under which law must healthcare enterprises guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format?

Sarbox

COPPA

GLBA

HIPAA

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attacker category might have the objective of retaliation against an employer?

Cybercriminal

Insider

hactivist

state-sponsored attacker

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a term associated with cybersecurity?

risk

information assurance

malware

goal

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is frequently used to describe the tasks of securing technology?

network security

information assurance

cybersecurity

information warfare

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Terrorists who turn their attacks to the network and computer infrastructure to cause panic among citizens are known as which of the following?

cyberterrorists

spies

hackers

hactivists

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the term for a hacker who probes a system for weaknesses and provides that information back to the organization?

gray hat hacker

white hat hacker

black hat hacker

red hat hacker

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you call a flaw or weakness in a computer system that allows access by threat actors?

risk

vulnerability

asset

threat

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?