CO2521 Revision Part 2

CO2521 Revision Part 2

University

8 Qs

quiz-placeholder

Similar activities

UTB - FCNS 221PB

UTB - FCNS 221PB

University

10 Qs

PTD - 1A

PTD - 1A

University

10 Qs

TEST SOP LOGICAL ACCESS

TEST SOP LOGICAL ACCESS

1st Grade - Professional Development

10 Qs

Reading and Reviewing - Research Seminar

Reading and Reviewing - Research Seminar

University

10 Qs

DE quiz based on unit 1 & 2

DE quiz based on unit 1 & 2

University

10 Qs

Software Engineering :TEST 2

Software Engineering :TEST 2

University

10 Qs

VITAP Quiz-1

VITAP Quiz-1

University

10 Qs

WN-CELLULAR CONCEPT

WN-CELLULAR CONCEPT

University

10 Qs

CO2521 Revision Part 2

CO2521 Revision Part 2

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Christopher Finnigan

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 4 pts

Define and explain any TWO components of the CIA triad.

Evaluate responses using AI:

OFF

2.

MATCH QUESTION

1 min • 4 pts

Match the following quantitative risk assessment terminologies

It is a monetary value that represents the cost of a single loss event.

Exposure Factor

A numerical value that represents the number of times a risk event is expected to occur in a year.

Single Loss Expectance

A numerical value that represents the proportion of asset value that would be lost in an attack.

Annualized Loss Expectancy

The expected financial loss that an organization would incur in a year from a particular risk.

Annual Rate of Occurrence

3.

DRAG AND DROP QUESTION

1 min • 1 pt

​ (a)   = ​ (b)   x Exposure Factor

Single Loss Expectancy
Asset Value
Occurrence
Risk
Annual Rate of Occurrence

Answer explanation

Single Loss Expectancy = AV x EF

4.

DRAG AND DROP QUESTION

45 sec • 2 pts

​ (a)   is the practice of concealing the existence of a message within another seemingly innocent message or cover medium.

​ (b)   is focused on securing the content of a message by transforming it so that only the intended recipient can understand it,

Steganography
Cryptography

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a characteristic of hash algorithms?

Unique

Secure

Fixed-size

Fast

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these would NOT be part of the architecture description?

system requirements

functionality

behaviour

risk

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these IS a function of Security Controls?

Risk Management: It is designed to mitigate risks and reduce the impact of security incidents.

Business Operations: such as supply chain management systems

Human Resource Management:such as hiring, training, and performance management

Financial management: the management of an organisation's financial resources, including planning and budgeting,

8.

LABELLING QUESTION

1 min • 4 pts

Label the missing stages of the Electronic Discovery Reference Model.

d
c
b
a
Identification
Preservation
Analysis
Presentation

Answer explanation

An attacker who is able to exploit a buffer overflow vulnerability can gain a number of benefits, including:

Arbitrary code execution

Denial of Service (DoS)

Information disclosure

Privilege escalation