KYT/CAT - Cyber Security

KYT/CAT - Cyber Security

1st Grade - University

37 Qs

quiz-placeholder

Similar activities

Internet Business Associate Lesson 8

Internet Business Associate Lesson 8

6th - 8th Grade

37 Qs

IAS - Assignment 3

IAS - Assignment 3

University

40 Qs

AP Computer Science Principles Practice Exam

AP Computer Science Principles Practice Exam

9th - 12th Grade

40 Qs

The CPU & Microprocessor Quiz for IGCSE

The CPU & Microprocessor Quiz for IGCSE

12th Grade

36 Qs

CompTIA Security+ SY0-701 Practice Test 4+5

CompTIA Security+ SY0-701 Practice Test 4+5

12th Grade

41 Qs

ICT Technology Trends Quiz

ICT Technology Trends Quiz

9th - 12th Grade

32 Qs

2.1 PLTW Data Diligence

2.1 PLTW Data Diligence

9th Grade

37 Qs

Msw Logo Review

Msw Logo Review

6th - 8th Grade

39 Qs

KYT/CAT - Cyber Security

KYT/CAT - Cyber Security

Assessment

Quiz

Computers

1st Grade - University

Easy

Used 1K+ times

FREE Resource

37 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The integrity threat can be examplified by which of the following scenarios:

Customer records were hidden, but might have been slightly garbled

Every customer record is exposed by nation states

The entire company database was posted to the Internet.

Every customer record is stolen by hackers

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Let's talk about adversary types: we can say that Hacktivists are?

Motivated by greed, well funded and being tracked in increasingly efficient ways

Motivated by curiosity and predictable

Motivated by anger and unpredictable and well organized

Motivated by dominance and being supported by world class means

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The art and science of breaking code is called

Cryptography

Cryptanalysis

Encryption

Decryption

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The art and science of creating code is called

Cryptography

Cryptanalysis

Encryption

Decryption

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Distribution, amplification, spoofing and reflection are fundamental notions of what ?
Integrity threats
Adversary types
Availability threats
Confidentiality threats

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Let's talk about adversary types: we can say that vandals are?
Motivated by curiosity and predictable
Motivated by greed, well funded and being tracked in increasingly efficient ways
Motivated by anger and unpredictable and well organized
Motivated by dominance and being supported by world class means

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

In the words of Ritchie and Thompson, what is a Shell ?
The command interpreter that looks after the communication between the user and the system
The OS that manages the control of the machine and supervises the scheduling of the programs
None of these answers
The utility tasks

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?