1 - Introduction to Cyber Security

1 - Introduction to Cyber Security

12th Grade

21 Qs

quiz-placeholder

Similar activities

PF Lesson 8 & 9 Test

PF Lesson 8 & 9 Test

9th - 12th Grade

19 Qs

Ethical Principles in Health Science Quiz

Ethical Principles in Health Science Quiz

9th - 12th Grade

16 Qs

Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

21 Qs

Module 2- Cyber Forensics

Module 2- Cyber Forensics

12th Grade - University

16 Qs

teszt

teszt

12th Grade

22 Qs

Principles of Information Technology

Principles of Information Technology

9th - 12th Grade

20 Qs

STEM

STEM

7th - 12th Grade

25 Qs

UJIAN PENGESANAN SK T5 TOPIK 1.1 KOMPUTER DAN IMPAK

UJIAN PENGESANAN SK T5 TOPIK 1.1 KOMPUTER DAN IMPAK

12th Grade

20 Qs

1 - Introduction to Cyber Security

1 - Introduction to Cyber Security

Assessment

Quiz

Other

12th Grade

Medium

Created by

Fikri S

Used 2+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Information Security?

Prevention

Detection

Recovery

Authorization

Answer explanation

The main goal of Information Security is Prevention, which focuses on stopping security incidents before they occur.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the concept that indicates exposure to the chance of damage or loss?

Risk

Vulnerabilities

Threats

Attacks

Answer explanation

The concept that indicates exposure to the chance of damage or loss is 'Risk'. It encompasses vulnerabilities, threats, and potential attacks.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are conditions that leave a device open to harm called?

Vulnerabilities

Threats

Attacks

Controls

Answer explanation

Conditions that leave a device open to harm are called vulnerabilities, making it the correct choice.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a technique used to exploit a vulnerability without authorization?

Vulnerabilities

Controls

Attacks

Threats

Answer explanation

Attacks are the technique used to exploit a vulnerability without authorization, making it the correct choice among the options provided.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are countermeasures put in place to avoid security risks called?

Controls

Attacks

Vulnerabilities

Threats

Answer explanation

Countermeasures put in place to avoid security risks are called controls.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of determining what rights and privileges an entity has?

Authentication

Authorization

Identification

Recovery

Answer explanation

Authorization is the process of determining what rights and privileges an entity has.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of transforming plaintext to ciphertext that cannot be directly decrypted?

Steganography

Decryption

Encryption

Hashing

Answer explanation

The process of transforming plaintext to ciphertext that cannot be directly decrypted is known as hashing. Hashing is a one-way function that converts data into a fixed-size string of bytes.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?