Cybersecurity Terminology Quiz

Cybersecurity Terminology Quiz

University

20 Qs

quiz-placeholder

Similar activities

DATA VS INFORMATION

DATA VS INFORMATION

University

22 Qs

Basic Information Security

Basic Information Security

University

24 Qs

Bibliographic Utilities  & Specific Materials

Bibliographic Utilities & Specific Materials

University

15 Qs

overview of e-banking management

overview of e-banking management

University

15 Qs

Storage CompTIA 20200415

Storage CompTIA 20200415

University

15 Qs

HR SYSTEM- CHAPTER 7

HR SYSTEM- CHAPTER 7

University

20 Qs

Introduction  to Information Technology

Introduction to Information Technology

University

20 Qs

HIPAA Compliance

HIPAA Compliance

University - Professional Development

18 Qs

Cybersecurity Terminology Quiz

Cybersecurity Terminology Quiz

Assessment

Quiz

Other

University

Hard

Created by

Harrold Ventayen

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of access control?

The process of granting or denying specific requests to obtain and use information and related information processing services

The ability to make use of any information system resource

Security safeguards designed to detect and deny unauthorized access and permit authorized access to an information system

An attempt to gain unauthorized access to system services, resources, or information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of an advanced persistent threat?

An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors

An interface between two systems at which they are not connected physically and any logical connection is not automated

A program that monitors a computer or network to identify all major types of malware and prevent or contain malware incidents

A specific sequence of events indicative of an unauthorized access attempt

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of an attacker?

An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities

The aggregate of people, procedures, documentation, hardware, and/or software necessary to authorize and enable security-relevant functions

Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system

A party who acts with malicious intent to compromise an information system

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of an audit log?

A chronological record of information system activities, including records of system accesses and operations performed in a given period

Independent review and examination of records and activities to assess the adequacy of system controls

Timely, reliable access to data and information services for authorized users

A backup of files and programs made to facilitate recovery if necessary

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of black-box testing?

A test methodology that assumes no knowledge of the internal structure and implementation detail of the assessment object

The process of granting or denying specific requests to obtain and use information and related information processing services

An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors

Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of a blacklist?

A list of entities that are blocked or denied privileges or access

A violation of the security policy of a system

The exposure of proprietary, sensitive, or classified information

The prevention of authorized access to resources

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of a breach?

A list of entities that are blocked or denied privileges or access

Compromise of security that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to protected information

A violation of the security policy of a system

Preserving authorized restrictions on information access and disclosure

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?