Assets and Threats: Quiz 7

Assets and Threats: Quiz 7

Professional Development

15 Qs

quiz-placeholder

Similar activities

Security and Domain

Security and Domain

Professional Development

20 Qs

Security SY0701

Security SY0701

Professional Development

20 Qs

Lesson 2.6 Computer Fundamentals

Lesson 2.6 Computer Fundamentals

Professional Development

16 Qs

DST07 Day 1 quiz

DST07 Day 1 quiz

Professional Development

12 Qs

Security+ Study Guide-06 Threats, Vulnerabilities & Common Attac

Security+ Study Guide-06 Threats, Vulnerabilities & Common Attac

Professional Development

15 Qs

PC Tech Quiz 1

PC Tech Quiz 1

Professional Development

20 Qs

Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Professional Development

20 Qs

Cybersecurity Concepts

Cybersecurity Concepts

Professional Development

10 Qs

Assets and Threats: Quiz 7

Assets and Threats: Quiz 7

Assessment

Quiz

Computers

Professional Development

Hard

Created by

John Coder

FREE Resource

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

One method of applying an attacker mindset is using attack simulations. These activities are normally performed in one of two ways: proactively and reactively. Both approaches share a common goal, which is to make systems safer.

  • ? simulations assume the role of an attacker by exploiting vulnerabilities and breaking through defenses. This is sometimes called a red team exercise.

  • ? simulations assume the role of a defender responding to an attack. This is sometimes called a blue team exercise.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  • comp______________ refers to rival companies who pose a threat because they might benefit from leaked information.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

st____________ actors are government intelligence agencies.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

criminal syn___________ refer to organized groups of people who make money from criminal activity.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

ins__________ threats can be any individual who has or had authorized access to an organization’s resources. This includes employees who accidentally compromise assets or individuals who purposefully put them at risk for their own benefit.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

sha__________ IT refers to individuals who use technologies that lack IT governance. A common example is when an employee uses their personal email to send work-related communications.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Because the formal definition of a hacker is broad, the term can be a bit ambiguous. In security, it applies to three types of individuals based on their intent:

unau___________ hackers

Authorized, or eth___________, hackers

Sem_________-authorized hackers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?