CY3U10_Test Review
Quiz
•
Computers
•
11th Grade
•
Medium
CCRE UAH
Used 63+ times
FREE Resource
Enhance your content in a minute
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a MITRE ATT&CK?
A cognitive model used by the threat intelligence community to describe a specific event. It is based on the notion that an event has four characteristics.
A fairly simple design, with the top row of the matrix covering activities such as initial access, execution, persistence, privilege escalation, defense evasion, credential access, discovery, lateral movement, collection, command and control, exfiltration, and impact.
Malware that denies access to the victim data, threatening to publish or delete it unless a ransom is paid
A model developed as a military form of engagement framework. This model has a series of distinct steps that an attacker uses during a cyberattack.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a partially known environment?
A test methodology that assumes explicit and substantial knowledge of the internal structure and implementation detail of the assessment object, also known as white box testing.
A method of software testing that examines the functionality of an application without peering into its internal structures or workings, also known as black box testing.
A test methodology that focuses on cloud infrastructure, which can create exposure from network, application, and configuration vulnerabilities that can result in external access to company credentials, internal systems, and sensitive data.
A test methodology that assumes some knowledge of the internal structure and implementation detail of the assessment object, also known as gray box testing.
3.
OPEN ENDED QUESTION
3 mins • Ungraded
Complex systems have 5 components. Name 3 of the components.
Evaluate responses using AI:
OFF
Answer explanation
The 5 components of a complex system are hardware, software, social, economic, and political.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is assessment?
The testing or evaluation of security controls to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for an information system or organization.
A technique used to identify hosts/host attributes and associated vulnerabilities.
An analysis of an information system’s requirements, functions, and interdependencies used to characterize system contingency requirements and priorities in the event of a significant disruption.
An Individual or organization having a right, share, claim, or interest in a system or in its possession of characteristics that meet their needs and expectations.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a stakeholder?
An Individual or organization having a right, share, claim, or interest in a system or in its possession of characteristics that meet their needs and expectations.
A technique used to identify hosts/host attributes and associated vulnerabilities.
The testing or evaluation of security controls to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for an information system or organization.
A collection of interconnected computer networks.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is cyberspace?
A collection of interconnected computer networks.
The latest iteration of cellular technology, engineered to greatly increase the speed and responsiveness of wireless networks.
The application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks.
A cognitive model used by the threat intelligence community to describe a specific event.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a vulnerability scan?
A technique used to identify hosts/host attributes and associated vulnerabilities.
The ability for an attacker to maneuver and go deeper within your network to attain data and information.
The the exploitation of a bug or flaw that allows for a higher privilege level than what would normally be permitted.
An information system’s requirements, functions, and interdependencies used to characterize system contingency requirements and priorities in the event of a significant disruption.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Alapismeretek
Quiz
•
7th - 12th Grade
10 questions
Scratch
Quiz
•
KG - Professional Dev...
10 questions
Network Security
Quiz
•
9th - 11th Grade
16 questions
AI Checkpoint 1 Revision
Quiz
•
9th - 12th Grade
15 questions
Cyber Security KS4
Quiz
•
8th - 12th Grade
15 questions
Excel
Quiz
•
10th - 12th Grade
18 questions
12AIT - All About W3C <3
Quiz
•
10th Grade - University
18 questions
EXA-DIAG-INF-III-AGO-2022
Quiz
•
11th Grade
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Computers
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
15 questions
Christmas Song Emoji Pictionary
Quiz
•
7th - 12th Grade
20 questions
Christmas Movies
Quiz
•
1st - 12th Grade
20 questions
Christmas Movie Trivia
Quiz
•
9th - 12th Grade
29 questions
christmas facts
Lesson
•
5th - 12th Grade
20 questions
Christmas Trivia
Quiz
•
5th - 12th Grade
20 questions
Stages of Meiosis
Quiz
•
9th - 12th Grade
20 questions
christmas songs
Quiz
•
KG - University
