
CO2521 Revision Part 2
Quiz
•
Computers
•
University
•
Practice Problem
•
Medium
Christopher Finnigan
Used 3+ times
FREE Resource
Enhance your content in a minute
8 questions
Show all answers
1.
OPEN ENDED QUESTION
3 mins • 4 pts
Define and explain any TWO components of the CIA triad.
Evaluate responses using AI:
OFF
2.
MATCH QUESTION
1 min • 4 pts
Match the following quantitative risk assessment terminologies
It is a monetary value that represents the cost of a single loss event.
Exposure Factor
A numerical value that represents the number of times a risk event is expected to occur in a year.
Single Loss Expectance
A numerical value that represents the proportion of asset value that would be lost in an attack.
Annualized Loss Expectancy
The expected financial loss that an organization would incur in a year from a particular risk.
Annual Rate of Occurrence
3.
DRAG AND DROP QUESTION
1 min • 1 pt
(a) = (b) x Exposure Factor
Answer explanation
Single Loss Expectancy = AV x EF
4.
DRAG AND DROP QUESTION
45 sec • 2 pts
(a) is the practice of concealing the existence of a message within another seemingly innocent message or cover medium.
(b) is focused on securing the content of a message by transforming it so that only the intended recipient can understand it,
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is NOT a characteristic of hash algorithms?
Unique
Secure
Fixed-size
Fast
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these would NOT be part of the architecture description?
system requirements
functionality
behaviour
risk
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these IS a function of Security Controls?
Risk Management: It is designed to mitigate risks and reduce the impact of security incidents.
Business Operations: such as supply chain management systems
Human Resource Management:such as hiring, training, and performance management
Financial management: the management of an organisation's financial resources, including planning and budgeting,
8.
LABELLING QUESTION
1 min • 4 pts
Label the missing stages of the Electronic Discovery Reference Model.
Answer explanation
An attacker who is able to exploit a buffer overflow vulnerability can gain a number of benefits, including:
Arbitrary code execution
Denial of Service (DoS)
Information disclosure
Privilege escalation
Similar Resources on Wayground
10 questions
UAS Audit Sistem Informasi
Quiz
•
University
11 questions
Day #03 | Quiz
Quiz
•
University
10 questions
PYTHON_CHAPTER 6
Quiz
•
University
10 questions
CS1010 Lab 02
Quiz
•
University
10 questions
Round - 3
Quiz
•
University
10 questions
pictoblox_lvl_1
Quiz
•
2nd Grade - University
10 questions
Software Engineering Unit1
Quiz
•
University
9 questions
CHAPTER 5 ONLINE QUIZ
Quiz
•
University
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
Discover more resources for Computers
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
7 questions
Different Types of Energy
Interactive video
•
4th Grade - University
20 questions
Slopes and Slope-Intercept Form
Quiz
•
8th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
7 questions
Biomolecules (Updated)
Interactive video
•
11th Grade - University
20 questions
Winter/Holiday Trivia
Quiz
•
KG - University
10 questions
WINTER WIN Time - ELA - 12/9/2025
Quiz
•
KG - University
7 questions
Human Impact on Resources
Interactive video
•
4th Grade - University
