Search Header Logo

Assets and Threats: Quiz 7

Authored by John Coder

Computers

Professional Development

Assets and Threats: Quiz 7
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

One method of applying an attacker mindset is using attack simulations. These activities are normally performed in one of two ways: proactively and reactively. Both approaches share a common goal, which is to make systems safer.

  • ? simulations assume the role of an attacker by exploiting vulnerabilities and breaking through defenses. This is sometimes called a red team exercise.

  • ? simulations assume the role of a defender responding to an attack. This is sometimes called a blue team exercise.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  • comp______________ refers to rival companies who pose a threat because they might benefit from leaked information.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

st____________ actors are government intelligence agencies.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

criminal syn___________ refer to organized groups of people who make money from criminal activity.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

ins__________ threats can be any individual who has or had authorized access to an organization’s resources. This includes employees who accidentally compromise assets or individuals who purposefully put them at risk for their own benefit.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

sha__________ IT refers to individuals who use technologies that lack IT governance. A common example is when an employee uses their personal email to send work-related communications.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Because the formal definition of a hacker is broad, the term can be a bit ambiguous. In security, it applies to three types of individuals based on their intent:

unau___________ hackers

Authorized, or eth___________, hackers

Sem_________-authorized hackers

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?