CYB125 - Ch3

CYB125 - Ch3

University

36 Qs

quiz-placeholder

Similar activities

Encryption/Decryption

Encryption/Decryption

University

40 Qs

OWASP Noida Quiz

OWASP Noida Quiz

University

35 Qs

ITE 292 P3 Exam

ITE 292 P3 Exam

University

37 Qs

CYB125 - Ch8

CYB125 - Ch8

University

39 Qs

Revision Quiz

Revision Quiz

University

40 Qs

Integrated Application Software Prefinals

Integrated Application Software Prefinals

12th Grade - University

41 Qs

Summative 1 Crypto currency

Summative 1 Crypto currency

11th Grade - University

32 Qs

TOPIC 1: COMPUTER HARDWARE

TOPIC 1: COMPUTER HARDWARE

University

40 Qs

CYB125 - Ch3

CYB125 - Ch3

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Damon Vogel

Used 1+ times

FREE Resource

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows a cross-site scripting attack against the server. What term describes the issue that Adam discovered?

Threat

Vulnerability

Risk

Impact

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes an action that can damage or compromise an asset?

Risk

Vulnerability

Countermeasure

Threat

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Purchasing an insurance policy is an example of the ____________ risk management strategy.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Aditya is the security manager for a mid-sized business. The company has suffered several serious data losses when laptops were stolen. Aditya decides to implement full disk encryption on all laptops. What risk response did Aditya take?

Reduce

Transfer

Accept

Avoid

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Residual Risk describes the risk that exists after an organization has performed all planned countermeasures and controls?

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Violet deploys an intrusion prevention system (IPS) on her network as a security control. What type of control has Violet deployed?

Detective

Preventive

Corrective

Deterrent

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an alteration threat?

Espionage

System or data modification

Intentional information leak

Denial of service

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?