AP Ck CyberSecurity Pre-Test

Flashcard
•
Information Technology (IT)
•
12th Grade
•
Hard
Quizizz Content
FREE Resource
Student preview

43 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Which of the following describes availability when referring to the CIA Triad? Options: Data are permanently deleted after use by authorized individuals. Data are only accessible by authorized individuals. Data are accurate and trustworthy when being viewed by authorized individuals. Data are accessible when required by authorized individuals.
Back
Data are accessible when required by authorized individuals.
2.
FLASHCARD QUESTION
Front
Which of the following is a potential effect of a breach involving data from a government system? Members of the public could have their PII compromised. The government will be able to access additional resources. Private industries will be given access to more government contracts. The government will reduce their spending on security features.
Back
Members of the public could have their PII compromised.
3.
FLASHCARD QUESTION
Front
Which of the following describes a state adversary?
Back
They are typically employed by a government and have access to more powerful tools than the average adversary.
4.
FLASHCARD QUESTION
Front
A risk manager is running a risk assessment for their organization. They have gathered all the assets that are in the scope of assessment and determined the value for each asset. What should be the risk manager's next step in the risk assessment?
Back
They should determine the vulnerabilities that would impact the assets.
5.
FLASHCARD QUESTION
Front
Which of the following is an example of a hardware vulnerability for a device? A device that uses insecure APIs. A device that allows unsanitized user inputs. A device that has imported third-party libraries. A device with out-of-date firmware.
Back
A device with out-of-date firmware.
6.
FLASHCARD QUESTION
Front
Which of the following proactive strategies help a cybersecurity professional determine threats that could impact a system they are trying to protect? They can run system health checks. They can set up user access controls. They can implement multi-factor authentication. They can think like an adversary would.
Back
They can think like an adversary would.
7.
FLASHCARD QUESTION
Front
Which of the following would be an example of something that might show up on a quantitative security vulnerability risk analysis? Options: The chance of a laptop being damaged is high. The probability of a laptop’s battery going bad is 4%. The impact of a laptop screen cracking is “critical”. The cost to replace a stolen laptop would be $800.
Back
The cost to replace a stolen laptop would be $800.
Create a free account and access millions of resources
Similar Resources on Wayground
36 questions
Cybersecurity 2.1 & 2.2

Flashcard
•
11th Grade
38 questions
Cyber Security Networking Challenge

Flashcard
•
12th Grade
43 questions
Block 3 all Units

Flashcard
•
University
43 questions
Block 3 all Units

Flashcard
•
University
43 questions
Block 3 all Units

Flashcard
•
University
32 questions
Module 6: Data Link Layer Flashcardizz

Flashcard
•
11th Grade - University
43 questions
AP Ck CyberSecurity Pre-Test

Flashcard
•
12th Grade
41 questions
Wired and Wireless Network

Flashcard
•
KG
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade