Network Security Concepts

Network Security Concepts

University

24 Qs

quiz-placeholder

Similar activities

Keamanan Siber (T3)

Keamanan Siber (T3)

University

20 Qs

Security Threats

Security Threats

10th Grade - University

20 Qs

T Level Digital Security Revision

T Level Digital Security Revision

11th Grade - University

24 Qs

Test Serangan dan Teknik

Test Serangan dan Teknik

University

20 Qs

คอมพิวเตอร์และการบำรุงรักษา

คอมพิวเตอร์และการบำรุงรักษา

University

20 Qs

BAB 11

BAB 11

University

20 Qs

Cybersecurity Essentials Chapter 1 Review

Cybersecurity Essentials Chapter 1 Review

10th Grade - University

25 Qs

2B. Active Reconnaissance - Enumeration

2B. Active Reconnaissance - Enumeration

University

24 Qs

Network Security Concepts

Network Security Concepts

Assessment

Quiz

Computers

University

Medium

Created by

Jorge Valdez

Used 14+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security term is used to describe anything of value to the organization? It includes people, equipment, resources, and data

Vulnerability

Exploit

Asset

Risk

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security term is used to describe a weakness in a system, or its design, that could be exploited by a threat?

Vulnerability

Asset

Risk

Mitigation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security term is used to describe a potential danger to a company’s assets, data, or network functionality?

Vulnerability

Exploit

Threat

Risk

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security term is used to describe a mechanism that takes advantage of a vulnerability?

Exploit

Threat

Risk

Mitigation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security term is used to describe the counter-measure for a potential threat or risk?

Vulnerability

Exploit

Asset

Mitigation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security term is used to describe the likelihood of a threat to exploit the vulnerability of an asset, with the aim of negatively affecting an organization?

Vulnerability

Exploit

Threat

Risk

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of hacker is described in the scenario: After hacking into ATM machines remotely using a laptop, I worked with ATM manufacturers to resolve the security vulnerabilities that I discovered.

White Hat

Black Hat

Grey Hat

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?