Cybersecurity Terminology Quiz Part 1

Cybersecurity Terminology Quiz Part 1

University

15 Qs

quiz-placeholder

Similar activities

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Multi Factor Authentication

Multi Factor Authentication

University

20 Qs

حماية البيانات

حماية البيانات

8th Grade - University

20 Qs

Target

Target

University

16 Qs

Cybersecurity Awareness Quiz

Cybersecurity Awareness Quiz

9th Grade - University

15 Qs

Cybersecurity Quiz 1

Cybersecurity Quiz 1

University

20 Qs

Cyber Security

Cyber Security

5th Grade - Professional Development

20 Qs

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

9th Grade - University

10 Qs

Cybersecurity Terminology Quiz Part 1

Cybersecurity Terminology Quiz Part 1

Assessment

Quiz

Computers

University

Medium

Created by

Harrold Ventayen

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Advanced persistent threats typically require high levels of expertise and substantial resources to execute. Is this statement true or false?

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authentication is the process of verifying the identity of a user, process, device, and network.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Access control is defined as the process of granting or denying specific requests to obtain and use information and related information processing services.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the methodology that assumes no knowledge of the internal structure and implementation detail of the assessment object?

Blacklist

Breach

Continuous Monitoring

Black Box Testing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a list of entities that are blocked or denied privileges or access?

Blacklist

Breach

Cryptography

Data Loss

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the compromise of security that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to protected information?

Breach

Compromise

Confidentiality

Decryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the violation of the security policy of a system such that an unauthorized disclosure, modification, or destruction of sensitive information has occurred?

Continuous Monitoring

Critical Infrastructure

Compromise

Digital Forensics

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?