Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Professional Development

12 Qs

quiz-placeholder

Similar activities

Quiz on Operating System Services

Quiz on Operating System Services

Professional Development

15 Qs

Minigame 2-HB Academy

Minigame 2-HB Academy

Professional Development

10 Qs

ST KKEM QUIZ SELENIUM PART!

ST KKEM QUIZ SELENIUM PART!

Professional Development

10 Qs

The Well Architected one

The Well Architected one

Professional Development

12 Qs

IBM Digital University - Day 3

IBM Digital University - Day 3

Professional Development

10 Qs

Elearn, Emails, Netiquette

Elearn, Emails, Netiquette

Professional Development

10 Qs

JSKBS - Database Management System

JSKBS - Database Management System

Professional Development

15 Qs

Ice Breaker Challenge- Guess the Tool by Its Logo

Ice Breaker Challenge- Guess the Tool by Its Logo

Professional Development

10 Qs

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

Gordon Bjorman

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

In the CIA triad, what does "Integrity" address?

Makes information accessible to only authorized persons
Makes sure information is not changed
Makes sure information is accesible when needed
None Of the Above

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Compliance rules are one of the primary concerns for information & cyber security professionals as existing rules are enforced and new laws are created.

True
False

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Business Risk is determined by…

information + availability + defense

vulnerability + attacks + remediation

assets + vulnerability + threat

assessment + information + defense

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

The process used to understand the nature and extent of risk is…

Risk appetite
Control baseline
Risk avoidance
Risk assessment

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

For automobile companies, a microchip shortage could be categorized as what type of risk

Pandemic

Industry

Compliance

Digital

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

What type of attack gives hackers remote control of a device?

Keylogger
Vishing
Rootkit
Worm

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Hackers that use their abilities to support an ideological agenda are categorized as…

Nation State Threat Actors

Hacktivists

Unethical Hackers

APT's

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?