Search Header Logo

Malicious Attacks and Vulnerabilities Quiz

Authored by Jerome Mamansag

Computers

University

Used 5+ times

Malicious Attacks and Vulnerabilities Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following best describes a threat?

A valuable resource to the organization

A weakness that can be exploited

Any action that can damage or compromise an asset

The likelihood that something bad will happen

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A vulnerability is:

A valuable item that must be protected

The probability of loss or damage

A weakness that can be exploited

An intentional action to destroy data

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which CIA tenet is violated when unauthorized disclosure occurs?

Confidentiality

Integrity

Availability

Authenticity

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An alteration threat directly affects:

Confidentiality

Integrity

Availability

Accountability

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Denial-of-service attacks target which principle of the CIA triad?

Confidentiality

Integrity

Availability

Accountability

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is an asset?

Port scanner

Financial data

Keystroke logger

Malware

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which type of hacker is considered 'ethical' and tests security systems?

White-hat

Black-hat

Gray-hat

Crackers

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?