Cybersecurity Concepts

Cybersecurity Concepts

Professional Development

10 Qs

quiz-placeholder

Similar activities

ICT Comp Arch & Sec - Lesson 5 - Info Security

ICT Comp Arch & Sec - Lesson 5 - Info Security

Professional Development

10 Qs

Impact of Implementing Data in Organisations

Impact of Implementing Data in Organisations

Professional Development

10 Qs

Web Security- Post assessment

Web Security- Post assessment

Professional Development

15 Qs

Managing Security Risks: Quiz 2

Managing Security Risks: Quiz 2

Professional Development

11 Qs

cybersecurity I

cybersecurity I

Professional Development

14 Qs

ISMS

ISMS

Professional Development

10 Qs

IT ENGLISH: Research Project Topics - Encryption

IT ENGLISH: Research Project Topics - Encryption

Professional Development

10 Qs

Cybersecurity Concepts

Cybersecurity Concepts

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Hisquare Group

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

The need to ensure that information is only available to the right people without a leak is referred to as

Integrity

Availability

Security

Confidentiality

2.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

The need to ensure that information is only available anytime it is needed is referred to as

Integrity

Availability

Security

Confidentiality

3.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

The need to ensure that information is not tampered with in-transit is referred to as

Integrity

Availability

Security

Confidentiality

4.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

A loophole which an attacker can use to gain access to a system would be referred to as

Vulnerability

Threat

Exploit

Worm

Answer explanation

5.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What would you call an attack that does not allow legitimate user access to a service?

Cross-site scripting

Denial of service

Buffer overflow

Virus attack

Answer explanation

6.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What would you call an attack that does not allow legitimate user access to a service?

Cross-site scripting

Denial of service

Buffer overflow

Virus attack

Answer explanation

7.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What would you call data when you are sending money from one bank account to another?

Data at rest

Data in storage

Data in transit

Data in process

Answer explanation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?