Cybersecurity Intro Voacb

Cybersecurity Intro Voacb

Professional Development

11 Qs

quiz-placeholder

Similar activities

IT ENGLISH: Research Project Topics - Data & Privacy Protection

IT ENGLISH: Research Project Topics - Data & Privacy Protection

Professional Development

10 Qs

isc2 sample questions

isc2 sample questions

Professional Development

14 Qs

CyberSecurity

CyberSecurity

Professional Development

13 Qs

AI Cybersecurity Quiz

AI Cybersecurity Quiz

Professional Development

15 Qs

OSI Security Architecture

OSI Security Architecture

Professional Development

10 Qs

Business Processes - Lesson 2 - Info Security Req's

Business Processes - Lesson 2 - Info Security Req's

Professional Development

12 Qs

IT ENGLISH: Research Project Topics - Blockchain Technology

IT ENGLISH: Research Project Topics - Blockchain Technology

Professional Development

10 Qs

Encryption

Encryption

Professional Development

15 Qs

Cybersecurity Intro Voacb

Cybersecurity Intro Voacb

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Skylah Smith

Used 3+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cybersecurity (or security)

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

An organization’s ability to manage its defense of critical assets and data and react to change

A current or former employee, external vendor, or trusted partner who poses a security risk

The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cloud security

The practice of keeping an organization's network infrastructure secure from unauthorized access

The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users

Skills from other areas that can apply to different careers

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Internal threat

Any person or group who presents a security risk

An organization’s ability to manage its defense of critical assets and data and react to change

A current or former employee, external vendor, or trusted partner who poses a security risk

A specific type of PII that falls under stricter handling guidelines

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Network security

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

An organization’s ability to manage its defense of critical assets and data and react to change

The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users

The practice of keeping an organization's network infrastructure secure from unauthorized access

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Personally identifiable information

Any information used to infer an individual’s identity

A specific type of PII that falls under stricter handling guidelines

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security posture

An organization’s ability to manage its defense of critical assets and data and react to change

he practice of keeping an organization's network infrastructure secure from unauthorized access

Any circumstance or event that can negatively impact assets

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Sensitive personally identifiable information (SPII)

A specific type of PII that falls under stricter handling guidelines

Any information used to infer an individual’s identity

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?