Cybersecurity Terminology Quiz

Cybersecurity Terminology Quiz

University

20 Qs

quiz-placeholder

Similar activities

BLK

BLK

University

20 Qs

Quiz - Quanti 4

Quiz - Quanti 4

University

17 Qs

Natural Resource Economics

Natural Resource Economics

University

20 Qs

Neurotransmitter

Neurotransmitter

University - Professional Development

15 Qs

Les endroits dans la ville

Les endroits dans la ville

7th Grade - University

19 Qs

UTAR Industrial Session

UTAR Industrial Session

University - Professional Development

15 Qs

Introduction to Hemostasis Quiz 1

Introduction to Hemostasis Quiz 1

University

20 Qs

Labor Relations and Negotations 1

Labor Relations and Negotations 1

University - Professional Development

15 Qs

Cybersecurity Terminology Quiz

Cybersecurity Terminology Quiz

Assessment

Quiz

Other

University

Practice Problem

Hard

Created by

Harrold Ventayen

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of access control?

The process of granting or denying specific requests to obtain and use information and related information processing services

The ability to make use of any information system resource

Security safeguards designed to detect and deny unauthorized access and permit authorized access to an information system

An attempt to gain unauthorized access to system services, resources, or information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of an advanced persistent threat?

An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors

An interface between two systems at which they are not connected physically and any logical connection is not automated

A program that monitors a computer or network to identify all major types of malware and prevent or contain malware incidents

A specific sequence of events indicative of an unauthorized access attempt

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of an attacker?

An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities

The aggregate of people, procedures, documentation, hardware, and/or software necessary to authorize and enable security-relevant functions

Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system

A party who acts with malicious intent to compromise an information system

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of an audit log?

A chronological record of information system activities, including records of system accesses and operations performed in a given period

Independent review and examination of records and activities to assess the adequacy of system controls

Timely, reliable access to data and information services for authorized users

A backup of files and programs made to facilitate recovery if necessary

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of black-box testing?

A test methodology that assumes no knowledge of the internal structure and implementation detail of the assessment object

The process of granting or denying specific requests to obtain and use information and related information processing services

An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors

Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of a blacklist?

A list of entities that are blocked or denied privileges or access

A violation of the security policy of a system

The exposure of proprietary, sensitive, or classified information

The prevention of authorized access to resources

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of a breach?

A list of entities that are blocked or denied privileges or access

Compromise of security that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to protected information

A violation of the security policy of a system

Preserving authorized restrictions on information access and disclosure

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?