Search Header Logo

Cybersecurity Terminology Quiz Part 2

Authored by Harrold Ventayen

Other

University

Used 4+ times

Cybersecurity Terminology Quiz Part 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of interoperability?

The ability of one set of entities to physically connect to and logically communicate with another set of entities.

A security event in which an intruder gains unauthorized access to a system.

Authentication using two or more different factors.

An update to correct particular problems with software.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of intrusion?

The ability of one set of entities to physically connect to and logically communicate with another set of entities.

A security event in which an intruder gains unauthorized access to a system.

Authentication using two or more different factors.

An update to correct particular problems with software.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is intrusion detection and prevention the process of monitoring events in a computer system or network, analyzing them for signs of possible incidents, and attempting to stop detected possible incidents?

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of malware?

The ability of one set of entities to physically connect to and logically communicate with another set of entities.

A security event in which an intruder gains unauthorized access to a system.

The process of monitoring events in a computer system or network, analyzing them for signs of possible incidents, and attempting to stop detected possible incidents.

A program that is inserted into a system with the intent of compromising the confidentiality, integrity, or availability of the victim's data.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of multifactor authentication?

The ability of one set of entities to physically connect to and logically communicate with another set of entities.

A security event in which an intruder gains unauthorized access to a system.

Authentication using two or more different factors.

A program that is inserted into a system with the intent of compromising the confidentiality, integrity, or availability of the victim's data.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and the additional safeguards that mitigate this impact?

Risk analysis

Risk assessment

Scanning

Spear Phishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of identifying, estimating, and prioritizing risks to organizational operations resulting from the operation of an information system?

Risk analysis

Risk assessment

Spoofing

Structured Query Language (SQL) injection

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?