Malicious Attacks and Vulnerabilities Quiz

Malicious Attacks and Vulnerabilities Quiz

University

30 Qs

quiz-placeholder

Similar activities

Chapter 2 Vulnerabilites, Threats & Attacks

Chapter 2 Vulnerabilites, Threats & Attacks

University

26 Qs

Keamanan Jaringan dan IoT Exam 1

Keamanan Jaringan dan IoT Exam 1

University

35 Qs

Chapter 6. Networking Protocols and Threats

Chapter 6. Networking Protocols and Threats

University

30 Qs

CPET 18L Pre-Midterm Exam

CPET 18L Pre-Midterm Exam

University

30 Qs

ISC2 - CC - Chapter 1 - Module 4

ISC2 - CC - Chapter 1 - Module 4

University

26 Qs

Information Assurance and Security - Prelim Quiz

Information Assurance and Security - Prelim Quiz

University

25 Qs

Cybersecurity Essentials Chapter 1 Review

Cybersecurity Essentials Chapter 1 Review

10th Grade - University

25 Qs

035_Cloud-specific Vulnerabilities – CompTIA Security+ –

035_Cloud-specific Vulnerabilities – CompTIA Security+ –

9th Grade - University

25 Qs

Malicious Attacks and Vulnerabilities Quiz

Malicious Attacks and Vulnerabilities Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Jerome Mamansag

Used 4+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following best describes a threat?

A valuable resource to the organization

A weakness that can be exploited

Any action that can damage or compromise an asset

The likelihood that something bad will happen

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A vulnerability is:

A valuable item that must be protected

The probability of loss or damage

A weakness that can be exploited

An intentional action to destroy data

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which CIA tenet is violated when unauthorized disclosure occurs?

Confidentiality

Integrity

Availability

Authenticity

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An alteration threat directly affects:

Confidentiality

Integrity

Availability

Accountability

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Denial-of-service attacks target which principle of the CIA triad?

Confidentiality

Integrity

Availability

Accountability

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is an asset?

Port scanner

Financial data

Keystroke logger

Malware

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which type of hacker is considered 'ethical' and tests security systems?

White-hat

Black-hat

Gray-hat

Crackers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?