Chapter1

Chapter1

University

18 Qs

quiz-placeholder

Similar activities

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

9th Grade - University

20 Qs

Five pillar of information security

Five pillar of information security

University

15 Qs

Cyber Security Organizational Implications

Cyber Security Organizational Implications

University

19 Qs

IP Sec

IP Sec

University

18 Qs

trabajo 2 modulo II parte II C1

trabajo 2 modulo II parte II C1

University

15 Qs

MTA Security Fundamentals Lesson 1 Review

MTA Security Fundamentals Lesson 1 Review

10th Grade - Professional Development

21 Qs

Cloud Computing Applications

Cloud Computing Applications

University

17 Qs

Cyber Security

Cyber Security

University

23 Qs

Chapter1

Chapter1

Assessment

Quiz

Computers

University

Hard

Created by

SYAKIRA WAHAB

Used 1+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is NOT a characteristic of Advanced Persistent Threat (APT)?

can span several years

targets sensitive proprietary information

uses advanced tools and techniques

is only used by hactivists against foreign enemies

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following was used to describe attackers who would break into a computer system without the owner’s permission and publicly disclose the vulnerability?

white hat hackers

black hat hackers

blue hat hackers

gray hat hackers

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which the following is NOT a reason why it is difficult to defend against today’s

attackers?

increased speed of attacks

simplicity of attack tools

greater sophistication of defense tools

delays in security updating

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Why can brokers command such a high price for what they sell?

Brokers are licensed professionals

The attack targets are always wealthy corporations

The vulnerability was previously unknown and is unlikely to be patched quickly

Brokers work in teams and all the members must be compensated.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which phrase describes the term “security” in a general sense?

protection from only direct actions

using reverse attack vectors (RAV) for protection

only available on hardened computers and systems

the necessary steps to protect a person or property from harm

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

______ ensures that only authorized parties can view the information.

Confidentiality

Availability

Authorization

Integrity

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Each of the following is a successive layer in which information security is achieved

EXCEPT ___________.

products

purposes

procedures

people

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?