Search Header Logo

Vocabulary #1

Authored by Nicole Proteau

Other

9th - 12th Grade

Used 4+ times

Vocabulary #1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Indicators of compromise

IOC

IOS

threat

attack vector

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Some or all of the risk is transferred to a willing third party

risk transfer

risk avoidance

impact

vulnerability

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The process that balances the operational costs of providing protective measures with the gains achieved by protecting the asset

risk management

risk transfer

vulnerability broker

cybercriminal

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

When data is intentionally or unintentionally lost, stolen, or leaked to the outside world

data loss

threat

attack surface

risk

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A path by which a threat actor can gain access to a server, host, or network

attack vector

assets

vulnerability

IOC

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Email/social networking, encrypted devices, cloud storage devices, removable media, hard copy, improper access control

common data loss vectors

attack surface

exploit

risk acceptance

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Anything of value to an organization

assets

threat

exploit

risk

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?