
AP Ck CyberSecurity Pre-Test
Flashcard
•
Information Technology (IT)
•
12th Grade
•
Hard
Wayground Content
FREE Resource
Student preview

43 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Which of the following describes availability when referring to the CIA Triad? Options: Data are permanently deleted after use by authorized individuals. Data are only accessible by authorized individuals. Data are accurate and trustworthy when being viewed by authorized individuals. Data are accessible when required by authorized individuals.
Back
Data are accessible when required by authorized individuals.
2.
FLASHCARD QUESTION
Front
Which of the following is a potential effect of a breach involving data from a government system? Members of the public could have their PII compromised. The government will be able to access additional resources. Private industries will be given access to more government contracts. The government will reduce their spending on security features.
Back
Members of the public could have their PII compromised.
3.
FLASHCARD QUESTION
Front
Which of the following describes a state adversary?
Back
They are typically employed by a government and have access to more powerful tools than the average adversary.
4.
FLASHCARD QUESTION
Front
A risk manager is running a risk assessment for their organization. They have gathered all the assets that are in the scope of assessment and determined the value for each asset. What should be the risk manager's next step in the risk assessment?
Back
They should determine the vulnerabilities that would impact the assets.
5.
FLASHCARD QUESTION
Front
Which of the following is an example of a hardware vulnerability for a device? A device that uses insecure APIs. A device that allows unsanitized user inputs. A device that has imported third-party libraries. A device with out-of-date firmware.
Back
A device with out-of-date firmware.
6.
FLASHCARD QUESTION
Front
Which of the following proactive strategies help a cybersecurity professional determine threats that could impact a system they are trying to protect? They can run system health checks. They can set up user access controls. They can implement multi-factor authentication. They can think like an adversary would.
Back
They can think like an adversary would.
7.
FLASHCARD QUESTION
Front
Which of the following would be an example of something that might show up on a quantitative security vulnerability risk analysis? Options: The chance of a laptop being damaged is high. The probability of a laptop’s battery going bad is 4%. The impact of a laptop screen cracking is “critical”. The cost to replace a stolen laptop would be $800.
Back
The cost to replace a stolen laptop would be $800.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?