Cybersecurity Terminology Quiz Part 1

Cybersecurity Terminology Quiz Part 1

University

15 Qs

quiz-placeholder

Similar activities

Computer Software and Hardware Quiz

Computer Software and Hardware Quiz

University

20 Qs

Data Breach Quiz

Data Breach Quiz

University

12 Qs

Review: Information Assurance and Security

Review: Information Assurance and Security

University

20 Qs

Hardware & Software

Hardware & Software

KG - University

20 Qs

Studio - U3 - LO1 - 1.3 Importance of Cyber Security

Studio - U3 - LO1 - 1.3 Importance of Cyber Security

9th Grade - University

10 Qs

CS180 ch7 | Security Breach Notification

CS180 ch7 | Security Breach Notification

University

11 Qs

DFIR - Phase 2 - Detection

DFIR - Phase 2 - Detection

University

10 Qs

Network and Internet Security

Network and Internet Security

University

20 Qs

Cybersecurity Terminology Quiz Part 1

Cybersecurity Terminology Quiz Part 1

Assessment

Quiz

Computers

University

Medium

Created by

Harrold Ventayen

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Advanced persistent threats typically require high levels of expertise and substantial resources to execute. Is this statement true or false?

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authentication is the process of verifying the identity of a user, process, device, and network.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Access control is defined as the process of granting or denying specific requests to obtain and use information and related information processing services.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the methodology that assumes no knowledge of the internal structure and implementation detail of the assessment object?

Blacklist

Breach

Continuous Monitoring

Black Box Testing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a list of entities that are blocked or denied privileges or access?

Blacklist

Breach

Cryptography

Data Loss

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the compromise of security that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to protected information?

Breach

Compromise

Confidentiality

Decryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the violation of the security policy of a system such that an unauthorized disclosure, modification, or destruction of sensitive information has occurred?

Continuous Monitoring

Critical Infrastructure

Compromise

Digital Forensics

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?