Threats and Attacks (Sec+)

Threats and Attacks (Sec+)

Professional Development

26 Qs

quiz-placeholder

Similar activities

Azure Final Exam

Azure Final Exam

Professional Development

30 Qs

C1 - NetSec

C1 - NetSec

Professional Development

24 Qs

Examen de práctica

Examen de práctica

Professional Development

25 Qs

BCS Systems & Architecture Quiz 3

BCS Systems & Architecture Quiz 3

University - Professional Development

22 Qs

Railroad crossing parts companies  quiz

Railroad crossing parts companies quiz

University - Professional Development

30 Qs

Difficult MCQs on Funding and Finance

Difficult MCQs on Funding and Finance

Professional Development

25 Qs

Front Office Operations - I (Surpise Test)

Front Office Operations - I (Surpise Test)

Professional Development

25 Qs

Lesson 3: Troubleshooting PC Hardware

Lesson 3: Troubleshooting PC Hardware

Professional Development

23 Qs

Threats and Attacks (Sec+)

Threats and Attacks (Sec+)

Assessment

Quiz

Instructional Technology

Professional Development

Medium

Created by

A1C SUDLER

Used 2+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a person’s identity is established with proof and confirmed by a system

Accounting

Authorization

Authentication

Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Occurs when a user is given access to a certain piece of data or certain areas of a building

Availability

Accounting

Authorization

Administration

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Non-repudiation occurs when you have proof that someone has taken an action

Accounting

Administration

Integrity

Access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

AAA stands for...

Availability

Authentication

Authorization

Authorization

Authentication

Accounting

Accounting

Availability

Administration

APT

Actors

Advanced Persistent Threats

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Types of security threats

Social Engineering

White Hats

Social Media

System Failure

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The CIA Triad consists of confidentiality, integrity and ______

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Short-hand term for malicious software

Mali

Hackers

Malware

MalSof

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?