
Vocabulary #1
Authored by Nicole Proteau
Other
9th - 12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Indicators of compromise
IOC
IOS
threat
attack vector
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Some or all of the risk is transferred to a willing third party
risk transfer
risk avoidance
impact
vulnerability
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
The process that balances the operational costs of providing protective measures with the gains achieved by protecting the asset
risk management
risk transfer
vulnerability broker
cybercriminal
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
When data is intentionally or unintentionally lost, stolen, or leaked to the outside world
data loss
threat
attack surface
risk
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A path by which a threat actor can gain access to a server, host, or network
attack vector
assets
vulnerability
IOC
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Email/social networking, encrypted devices, cloud storage devices, removable media, hard copy, improper access control
common data loss vectors
attack surface
exploit
risk acceptance
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Anything of value to an organization
assets
threat
exploit
risk
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?