
Cybersecurity Terminology Quiz Part 1
Authored by Harrold Ventayen
Computers
University
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Advanced persistent threats typically require high levels of expertise and substantial resources to execute. Is this statement true or false?
True
False
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Authentication is the process of verifying the identity of a user, process, device, and network.
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Access control is defined as the process of granting or denying specific requests to obtain and use information and related information processing services.
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the methodology that assumes no knowledge of the internal structure and implementation detail of the assessment object?
Blacklist
Breach
Continuous Monitoring
Black Box Testing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a list of entities that are blocked or denied privileges or access?
Blacklist
Breach
Cryptography
Data Loss
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the compromise of security that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to protected information?
Breach
Compromise
Confidentiality
Decryption
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the violation of the security policy of a system such that an unauthorized disclosure, modification, or destruction of sensitive information has occurred?
Continuous Monitoring
Critical Infrastructure
Compromise
Digital Forensics
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?