CYB125 - Ch1

CYB125 - Ch1

University

41 Qs

quiz-placeholder

Similar activities

Preliminary Examination - OOP

Preliminary Examination - OOP

University

40 Qs

SUMATIF AKHIR SEMESTER KLS 8 2024/2025

SUMATIF AKHIR SEMESTER KLS 8 2024/2025

8th Grade - University

40 Qs

SOAL PAS INFORMATIKA KLS 7

SOAL PAS INFORMATIKA KLS 7

7th Grade - University

45 Qs

Bagian 1: Berpikir Komputasional - Algoritma dan Dekomposisi

Bagian 1: Berpikir Komputasional - Algoritma dan Dekomposisi

9th Grade - University

40 Qs

C1 _S.Quiz: Intro to Profession

C1 _S.Quiz: Intro to Profession

University

46 Qs

Quiztronic

Quiztronic

University

40 Qs

Lecture Activity 2: IOT

Lecture Activity 2: IOT

University

40 Qs

SAS INFORMATIKA 9 SMT 1

SAS INFORMATIKA 9 SMT 1

9th Grade - University

40 Qs

CYB125 - Ch1

CYB125 - Ch1

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Medium

Created by

Anonymous Anonymous

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

41 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes the level of exposure to some event that has an effect on an asset, usually the likelihood that something bad will happen to an asset?

Risk

Countermeasure

Vulnerability

Threat

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bob is the information security and compliance manager for a financial institution. Which regulation is most likely to directly apply to Bob's employer?

Federal Information Security Management Act (FISMA)

Health Insurance Portability and Accountability Act (HIPAA)

Children's Internet Protection Act (CIPA)

Gramm-Leach-Bliley Act (GLBA)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rachel is investigating an information security incident that took place at the high school where she works. She suspects that students may have broken into the student records system and altered their grades. If that is correct, which one of the tenets of information security did this attack violate?

Confidentiality

Integrity

Availability

Nonrepudiation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What measures the average amount of time between failures for a particular system?

Uptime

Mean time to failure (MTTF)

Mean time to repair (MTTR)

Recovery time objective (RTO)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Juan’s web server was down for an entire day in April. It experienced no other downtime during that month. What represents the web server uptime for that month?

96.67%

93.33%

99.96%

1.03%

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which domain of a typical IT infrastructure is the first layer of defense for a layered security strategy?

User Domain

Workstation Domain

LAN Domain

WAN Domain

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security control is most helpful in protecting against eavesdropping on wide area network (WAN) transmissions?

Applying filters on exterior Internet Protocol (IP) stateful firewalls

Deploying an intrusion detection system/intrusion prevention system (IDS/IPS)

Blocking Transmission Control Protocol (TCP) synchronize (SYN) open connections

Encrypting transmissions with virtual private networks (VPNs)

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?