Thy Quiz

Thy Quiz

University

78 Qs

quiz-placeholder

Similar activities

English Language Proficiency 2

English Language Proficiency 2

9th Grade - University

80 Qs

Spring 22 Intermediate Final Exam Review

Spring 22 Intermediate Final Exam Review

12th Grade - University

75 Qs

DCN - Midterm Module 3

DCN - Midterm Module 3

University

76 Qs

practice test intermediate 8

practice test intermediate 8

7th Grade - University

80 Qs

Study Skills Final Exam Review

Study Skills Final Exam Review

12th Grade - University

77 Qs

Yearbook and Design Vocabulary

Yearbook and Design Vocabulary

12th Grade - University

75 Qs

TENSE - PASSIVE - REVIEW (032022)

TENSE - PASSIVE - REVIEW (032022)

6th Grade - University

75 Qs

1年生_学年末範囲

1年生_学年末範囲

11th Grade - University

80 Qs

Thy Quiz

Thy Quiz

Assessment

Quiz

English

University

Hard

Created by

Harry Nguyen

FREE Resource

78 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

A potential weakness in an asset or its defensive control system(s) is known as a vulnerability (1 word).

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

The probability of an unwanted occurrence, such as an adverse event or loss, is known as a risk (1 word).

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Network security focuses on the protection of physical items, objects, or areas from unauthorized access and misuse.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A breach of possession may not always result in a breach of confidentiality.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as ___________.

physical security

communications security

information security

network security

6.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Any event or circumstance that has the potential to adversely affect operations and assets is known as a threat (1 word).

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technique used to compromise a system is known as a ___________.

asset

access method

risk

exploit

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?