Hazards, Threats, and Vulnerabilities

Hazards, Threats, and Vulnerabilities

Professional Development

35 Qs

quiz-placeholder

Similar activities

1002 A + Ch 04 & 05 Security Principles & Security Technologies

1002 A + Ch 04 & 05 Security Principles & Security Technologies

Professional Development

33 Qs

Unit 5 CH 3 and 4

Unit 5 CH 3 and 4

Professional Development

35 Qs

Cybersecurity Quiz: Hacker Types and Cyber Attacks

Cybersecurity Quiz: Hacker Types and Cyber Attacks

Professional Development

34 Qs

C&SE PRE-KNOWLEDGE SURVEY (A+ 1102-CORE 2)

C&SE PRE-KNOWLEDGE SURVEY (A+ 1102-CORE 2)

University - Professional Development

40 Qs

A+ Core2 Day 5c methods for securing mobile and embedded devices

A+ Core2 Day 5c methods for securing mobile and embedded devices

Professional Development

40 Qs

Enterprise Architecture - PRETEST - SY2024-2025

Enterprise Architecture - PRETEST - SY2024-2025

Professional Development

40 Qs

Software_Requirements_Specifications

Software_Requirements_Specifications

Professional Development

36 Qs

AI900-01

AI900-01

Professional Development

40 Qs

Hazards, Threats, and Vulnerabilities

Hazards, Threats, and Vulnerabilities

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Graham Carmichael

Used 1+ times

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Backdoors in a system typically allow:

Improved system performance

Unauthorized access

Faster network speeds

Enhanced encryption

Answer explanation

Backdoors in a system typically allow unauthorized access, not improved system performance, faster network speeds, or enhanced encryption.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Shellshock bug is an example of:

Backdoor

Obsolete software

Software flaw

Unpatched system

Answer explanation

The Shellshock bug is an example of a software flaw, as it is a vulnerability in the Bash shell that allows attackers to execute arbitrary commands.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Risk acceptance involves:

Eliminating risk activities

Accepting risk if mitigation costs exceed impact

Avoiding all risks

Mitigating every possible risk

Answer explanation

Risk acceptance involves accepting risk if mitigation costs exceed impact.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of damage can a flood cause to data centres?

Increased data transfer speed

Data loss and service outages

Improved data security

Enhanced network connectivity

Answer explanation

A flood can cause data loss and service outages in data centres, impacting the availability and integrity of stored information.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Risk assessment evaluates identified risks to understand their:

Visual appeal

Market potential

Impact and likelihood

Marketing benefits

Answer explanation

Risk assessment evaluates identified risks to understand their impact and likelihood.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacktivists primarily engage in hacking to:

Steal financial data

Promote political agendas or social change

Sabotage infrastructure

Extort money

Answer explanation

Hacktivists primarily engage in hacking to promote political agendas or social change.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Classifying risks based on severity and impact is part of:

Reporting

Classification

Governance

Assurance

Answer explanation

Classifying risks based on severity and impact is part of Classification, as it involves categorizing risks according to their level of importance and potential consequences.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?