GEE 27 | Long Quiz - MIDTERMS

GEE 27 | Long Quiz - MIDTERMS

University

45 Qs

quiz-placeholder

Similar activities

Midterm GEE-LIE

Midterm GEE-LIE

University

50 Qs

Latihan USP Informatika IX paket 1

Latihan USP Informatika IX paket 1

9th Grade - University

50 Qs

SAT Informatika Kelas X TP.2024/2025

SAT Informatika Kelas X TP.2024/2025

10th Grade - University

40 Qs

QUIZ 3 - Data Design and Database Management

QUIZ 3 - Data Design and Database Management

University

40 Qs

Digital Citizenship and ICT Quiz

Digital Citizenship and ICT Quiz

8th Grade - University

49 Qs

xtgfrt

xtgfrt

University

40 Qs

Java қазақша 201 - 250

Java қазақша 201 - 250

University

50 Qs

Network Analysis Quiz

Network Analysis Quiz

University

49 Qs

GEE 27 | Long Quiz - MIDTERMS

GEE 27 | Long Quiz - MIDTERMS

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Easy

Created by

WILLIAM MALABANAN

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which set lists the three key objectives of computer security known as the CIA triad?

Confidentiality, Integrity, Availability

Confidentiality, Control, Access

Communication, Integrity, Access

Control, Integrity, Availability

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A breach in confidentiality occurs when ____.

information is disclosed without authorization

information is improperly modified or destroyed

a system operates with unauthorized interference

access to a system is interrupted

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which term refers to any weakness in a system’s design or operation that can be exploited?

Threat

Vulnerability

Risk

Countermeasure

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which BEST describes an active attack?

Gathering information without affecting resources

A natural disaster disrupting operations

An attempt to modify resources or disrupt operations

Documenting security policies

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which is considered a system resource (asset)?

Security policy

Hardware and software

Attack

Countermeasure

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The primary goal of a countermeasure is to ____.

increase the chance of an attack

reduce threats or vulnerabilities by preventing or minimizing attacks

create new vulnerabilities for testing

only detect attacks after they succeed

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which term denotes the likelihood of loss due to a threat exploiting a vulnerability?

Risk

Threat

Vulnerability

Attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?