Mod 2 Risk Adversity Trust

Mod 2 Risk Adversity Trust

9th Grade

20 Qs

quiz-placeholder

Similar activities

Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

POCS-Ch. 2 Review (Comprehension)

POCS-Ch. 2 Review (Comprehension)

7th - 12th Grade

20 Qs

Cybersecurity

Cybersecurity

9th - 12th Grade

15 Qs

CYB QUIZ: UNIT 1, LESSON 4 AND 5

CYB QUIZ: UNIT 1, LESSON 4 AND 5

9th Grade

20 Qs

Cybersecurity Fund:  Unit 1 Review

Cybersecurity Fund: Unit 1 Review

9th - 12th Grade

15 Qs

 Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

Cybersecurity Review

Cybersecurity Review

7th - 12th Grade

20 Qs

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

Mod 2 Risk Adversity Trust

Mod 2 Risk Adversity Trust

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Quizizz Content

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

User error resulting in the access to, modification of, and disclosure confidential information assets represents a loss of:

Confidentiality

Confidentiality and Integrity

Availability and Integrity

Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and the additional safeguards that mitigate this impact is known as:

CIA Triad

Risk Assessment

Incident Response

Risk Matrix

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to a weakness in an information system, system security procedures, internal controls, or implementation?

Threat

Vulnerability

Attack

Exploit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Human error resulting in a loss of confidentiality, integrity, or availability to an information resource is known as a:

Threat

Vulnerability

Attack

Exploit

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or false? Cybersecurity is a “hard problem” because cyberspace is large, interconnected, and complex.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes the purpose of a data classification system for cybersecurity?

To ensure filenames are compliant with the naming policy rules

To identify information assets and protect them from a loss of confidentiality, integrity and availability

To describe all possible vulnerabilities in the system

To initiate a threat assessment protocol

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fire, flood, or an adverse weather event impacting the security of information assets is known as a:

Threat

Bug

Attack

Exploit

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?