Cybersecurity Terminology Quiz Part 2

Cybersecurity Terminology Quiz Part 2

University

15 Qs

quiz-placeholder

Similar activities

Disaster Management

Disaster Management

University

20 Qs

Exportación

Exportación

University

10 Qs

Cyber Security  Quiz

Cyber Security Quiz

University

20 Qs

Cybersecurity 101

Cybersecurity 101

University

10 Qs

Provider Enrollment

Provider Enrollment

12th Grade - Professional Development

10 Qs

FIM Week 5 Tutorial

FIM Week 5 Tutorial

University

20 Qs

Earnings Per Share

Earnings Per Share

University

10 Qs

Hot Water 4

Hot Water 4

University

15 Qs

Cybersecurity Terminology Quiz Part 2

Cybersecurity Terminology Quiz Part 2

Assessment

Quiz

Other

University

Easy

Created by

Harrold Ventayen

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of interoperability?

The ability of one set of entities to physically connect to and logically communicate with another set of entities.

A security event in which an intruder gains unauthorized access to a system.

Authentication using two or more different factors.

An update to correct particular problems with software.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of intrusion?

The ability of one set of entities to physically connect to and logically communicate with another set of entities.

A security event in which an intruder gains unauthorized access to a system.

Authentication using two or more different factors.

An update to correct particular problems with software.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is intrusion detection and prevention the process of monitoring events in a computer system or network, analyzing them for signs of possible incidents, and attempting to stop detected possible incidents?

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of malware?

The ability of one set of entities to physically connect to and logically communicate with another set of entities.

A security event in which an intruder gains unauthorized access to a system.

The process of monitoring events in a computer system or network, analyzing them for signs of possible incidents, and attempting to stop detected possible incidents.

A program that is inserted into a system with the intent of compromising the confidentiality, integrity, or availability of the victim's data.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of multifactor authentication?

The ability of one set of entities to physically connect to and logically communicate with another set of entities.

A security event in which an intruder gains unauthorized access to a system.

Authentication using two or more different factors.

A program that is inserted into a system with the intent of compromising the confidentiality, integrity, or availability of the victim's data.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and the additional safeguards that mitigate this impact?

Risk analysis

Risk assessment

Scanning

Spear Phishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of identifying, estimating, and prioritizing risks to organizational operations resulting from the operation of an information system?

Risk analysis

Risk assessment

Spoofing

Structured Query Language (SQL) injection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?