
Assets and Threats: Quiz 7
Authored by John Coder
Computers
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
One method of applying an attacker mindset is using attack simulations. These activities are normally performed in one of two ways: proactively and reactively. Both approaches share a common goal, which is to make systems safer.
? simulations assume the role of an attacker by exploiting vulnerabilities and breaking through defenses. This is sometimes called a red team exercise.
? simulations assume the role of a defender responding to an attack. This is sometimes called a blue team exercise.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
comp______________ refers to rival companies who pose a threat because they might benefit from leaked information.
comp______________ refers to rival companies who pose a threat because they might benefit from leaked information.
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
st____________ actors are government intelligence agencies.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
criminal syn___________ refer to organized groups of people who make money from criminal activity.
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
ins__________ threats can be any individual who has or had authorized access to an organization’s resources. This includes employees who accidentally compromise assets or individuals who purposefully put them at risk for their own benefit.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
sha__________ IT refers to individuals who use technologies that lack IT governance. A common example is when an employee uses their personal email to send work-related communications.
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Because the formal definition of a hacker is broad, the term can be a bit ambiguous. In security, it applies to three types of individuals based on their intent:
unau___________ hackers
Authorized, or eth___________, hackers
Sem_________-authorized hackers
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?