Cybersecurity

Cybersecurity

University

30 Qs

quiz-placeholder

Similar activities

TRẮC NGHIỆM TIN 4 BÀI 2: GÕ PHÍM ĐÚNG CÁCH

TRẮC NGHIỆM TIN 4 BÀI 2: GÕ PHÍM ĐÚNG CÁCH

5th Grade - University

25 Qs

Pag-ahon

Pag-ahon

University

25 Qs

Frog Vle

Frog Vle

University

25 Qs

LATIHAN PENGENALAN KOMPUTER

LATIHAN PENGENALAN KOMPUTER

10th Grade - University

25 Qs

Analysis Algorithms Introduction

Analysis Algorithms Introduction

University

26 Qs

CCC30 - Chapter 8 - Digital Financial Services

CCC30 - Chapter 8 - Digital Financial Services

University

25 Qs

Adapter Cards

Adapter Cards

University

30 Qs

PEGAMBILAN KEPUTUSAN MANAJEMEN

PEGAMBILAN KEPUTUSAN MANAJEMEN

University

25 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Vincent Teh

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term vulnerability mean?

a weakness that makes a target susceptible to an attack

a known target or victim machine

a method of attack to exploit a target

a potential threat that a hacker creates

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

DoS

spoof

DDoS

ping sweep

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which workforce framework category includes highly specialized review and evaluation of incoming cybersecurity info?

Securely Provision

Protect and Defend

Oversight and Development

Analyze

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a valid state of data?

in-progress

in-process

in-moving

in-termination

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method helps to ensure data integrity?

hashing

repudiation

availability

security camera

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What service determines which resources a user can access along with the operations that a user can perform?

accounting

authentication

authorization

biometric

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is a common hash function?

Blowfish

MD5

RSA

SHA

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers