CompTIA N+ N10-009 Mock Test 3 Revision

CompTIA N+ N10-009 Mock Test 3 Revision

University

59 Qs

quiz-placeholder

Similar activities

Network+ Days 1 - 12

Network+ Days 1 - 12

University

60 Qs

Ujian Akhir Semester (UAS) Keamanan Sistem

Ujian Akhir Semester (UAS) Keamanan Sistem

University

60 Qs

GE IT ERA- Quiz # 1

GE IT ERA- Quiz # 1

University

55 Qs

IAS REVIEW

IAS REVIEW

University

60 Qs

Infasec Reviewer

Infasec Reviewer

University

56 Qs

CPTR363 Cybersecurity Quiz

CPTR363 Cybersecurity Quiz

University

61 Qs

Multimedia Operating Systems Quiz

Multimedia Operating Systems Quiz

University

60 Qs

IMC413 Test 20244

IMC413 Test 20244

University

60 Qs

CompTIA N+ N10-009 Mock Test 3 Revision

CompTIA N+ N10-009 Mock Test 3 Revision

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Tshepo Mofokeng

Used 1+ times

FREE Resource

59 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT one of the three main goals of computer security as remembered by the CIA triad?

Confidentiality

Compliance

Integrity

Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What term describes a weakness in a system-like an unlocked door-that could let someone cause harm, whether by accident or on purpose?

Threat

Risk

Vulnerability

Exploit

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the chance that someone or something might take advantage of that weakness to cause damage?

Vulnerability

Threat

Risk

Attack Vector

4.

MULTIPLE CHOICE QUESTION

30 sec • 12 pts

The person or thing causing the threat is called a/an:

Attack vector

Vulnerability actor

Risk agent

Threat actor

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of spotting possible problems (like weaknesses or threats), figuring out how serious they are, and deciding how to deal with them?

Security Audit

Posture Assessment

Process Assessment

Risk Management

6.

MULTIPLE CHOICE QUESTION

30 sec • 8 pts

Improving a system's security is called:

Hardening

Compliance

Assessment

Auditing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is any data that can identify a person-like their name, ID number, phone number, or address?

Confidential Information

Personal Information

Sensitive Data

Personally Identifiable Information (PII)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?