AP Ck CyberSecurity Pre-Test
Flashcard
•
Information Technology (IT)
•
12th Grade
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Student preview

43 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Which of the following describes availability when referring to the CIA Triad? Options: Data are permanently deleted after use by authorized individuals. Data are only accessible by authorized individuals. Data are accurate and trustworthy when being viewed by authorized individuals. Data are accessible when required by authorized individuals.
Back
Data are accessible when required by authorized individuals.
2.
FLASHCARD QUESTION
Front
Which of the following is a potential effect of a breach involving data from a government system? Members of the public could have their PII compromised. The government will be able to access additional resources. Private industries will be given access to more government contracts. The government will reduce their spending on security features.
Back
Members of the public could have their PII compromised.
3.
FLASHCARD QUESTION
Front
Which of the following describes a state adversary?
Back
They are typically employed by a government and have access to more powerful tools than the average adversary.
4.
FLASHCARD QUESTION
Front
A risk manager is running a risk assessment for their organization. They have gathered all the assets that are in the scope of assessment and determined the value for each asset. What should be the risk manager's next step in the risk assessment?
Back
They should determine the vulnerabilities that would impact the assets.
5.
FLASHCARD QUESTION
Front
Which of the following is an example of a hardware vulnerability for a device? A device that uses insecure APIs. A device that allows unsanitized user inputs. A device that has imported third-party libraries. A device with out-of-date firmware.
Back
A device with out-of-date firmware.
6.
FLASHCARD QUESTION
Front
Which of the following proactive strategies help a cybersecurity professional determine threats that could impact a system they are trying to protect? They can run system health checks. They can set up user access controls. They can implement multi-factor authentication. They can think like an adversary would.
Back
They can think like an adversary would.
7.
FLASHCARD QUESTION
Front
Which of the following would be an example of something that might show up on a quantitative security vulnerability risk analysis? Options: The chance of a laptop being damaged is high. The probability of a laptop’s battery going bad is 4%. The impact of a laptop screen cracking is “critical”. The cost to replace a stolen laptop would be $800.
Back
The cost to replace a stolen laptop would be $800.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
35 questions
Japanese Wakayama Reading Vocabulary
Flashcard
•
12th Grade
40 questions
19 3D graphics
Flashcard
•
University
31 questions
Preguntas sobre Ordenanzas Educativas
Flashcard
•
11th Grade
45 questions
Advanced Vocabulary Flashcards
Flashcard
•
University
30 questions
Evolución del Derecho y Cambios Sociales en los Siglos XIX y XX
Flashcard
•
KG - University
40 questions
Occupations Flashcard
Flashcard
•
Professional Development
29 questions
Phrasal Verbs and Their Meanings
Flashcard
•
12th Grade
34 questions
6.1 Introduction to the Atmosphere
Flashcard
•
11th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Information Technology (IT)
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
15 questions
Making Inferences
Quiz
•
7th - 12th Grade
12 questions
Add and Subtract Polynomials
Quiz
•
9th - 12th Grade
7 questions
How James Brown Invented Funk
Interactive video
•
10th Grade - University
15 questions
Atomic Habits: Career Habits
Lesson
•
9th - 12th Grade
20 questions
Banking
Quiz
•
9th - 12th Grade
15 questions
Exponential Growth and Decay Word Problems Practice
Quiz
•
9th - 12th Grade
18 questions
AP Bio Insta-Review Topic 6.1*: DNA & RNA Structure
Quiz
•
9th - 12th Grade