1.2 Attacking and Defending

1.2 Attacking and Defending

University

16 Qs

quiz-placeholder

Similar activities

Cryptography

Cryptography

6th Grade - University

15 Qs

COMPUTING CHAPTER 3-4 part1

COMPUTING CHAPTER 3-4 part1

University

15 Qs

Cyber 2 Module 9

Cyber 2 Module 9

9th Grade - Professional Development

21 Qs

Week 11 - Stategy & Planning

Week 11 - Stategy & Planning

University

20 Qs

CIA Triad quiz

CIA Triad quiz

University

14 Qs

Cybersecurity Quiz 1

Cybersecurity Quiz 1

University

20 Qs

CS180 ch7 | Security Breach Notification

CS180 ch7 | Security Breach Notification

University

11 Qs

MTA Security Fundamentals Lesson 1 Review

MTA Security Fundamentals Lesson 1 Review

10th Grade - Professional Development

21 Qs

1.2 Attacking and Defending

1.2 Attacking and Defending

Assessment

Quiz

Computers, Instructional Technology, Business

University

Medium

Created by

Aviciena Santoso

Used 3+ times

FREE Resource

16 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Cybersecurity consists of two things. First, ______ threats,

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Cybersecurity also consists of _______ risks.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Virtualbox is

a software solution that allows you to simulate a box in 3d

a security model where the organization is a castle, and everything else is dangerous

software that allows you to run one (or more) operating systems within a single device

a development environment that allows you to deploy boxes (servers) quickly after coding

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Vagrant in the context of cybersecurity?

A person without a settled home or regular work who wanders from place to place and lives by begging.

A tool made by Microsoft that allows you to host virtual machines on the cloud.

A SaaS platform that sets up virtual machines for you.

A tool that helps you create and manage virtual environments on your local machine.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym CIA stand for in cybersecurity?

Confidentiality, Integration, Accessibility

Central, Intelligence, Agency

Confidentiality, Integrity, Assessability

Confidentiality, Integrity, Accessability

6.

OPEN ENDED QUESTION

30 sec • 1 pt

In your own words, what is a definition for "Confidentiality"?

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

30 sec • 1 pt

In your own words, what is a definition for "Integrity"?

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?