Cybersecurity Terminology Quiz Part 2

Quiz
•
Other
•
University
•
Easy
Harrold Ventayen
Used 2+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the definition of interoperability?
The ability of one set of entities to physically connect to and logically communicate with another set of entities.
A security event in which an intruder gains unauthorized access to a system.
Authentication using two or more different factors.
An update to correct particular problems with software.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the definition of intrusion?
The ability of one set of entities to physically connect to and logically communicate with another set of entities.
A security event in which an intruder gains unauthorized access to a system.
Authentication using two or more different factors.
An update to correct particular problems with software.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Is intrusion detection and prevention the process of monitoring events in a computer system or network, analyzing them for signs of possible incidents, and attempting to stop detected possible incidents?
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the definition of malware?
The ability of one set of entities to physically connect to and logically communicate with another set of entities.
A security event in which an intruder gains unauthorized access to a system.
The process of monitoring events in a computer system or network, analyzing them for signs of possible incidents, and attempting to stop detected possible incidents.
A program that is inserted into a system with the intent of compromising the confidentiality, integrity, or availability of the victim's data.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the definition of multifactor authentication?
The ability of one set of entities to physically connect to and logically communicate with another set of entities.
A security event in which an intruder gains unauthorized access to a system.
Authentication using two or more different factors.
A program that is inserted into a system with the intent of compromising the confidentiality, integrity, or availability of the victim's data.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and the additional safeguards that mitigate this impact?
Risk analysis
Risk assessment
Scanning
Spear Phishing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the process of identifying, estimating, and prioritizing risks to organizational operations resulting from the operation of an information system?
Risk analysis
Risk assessment
Spoofing
Structured Query Language (SQL) injection
Create a free account and access millions of resources
Similar Resources on Wayground
12 questions
Entrepreneurship

Quiz
•
7th Grade - University
10 questions
Safety and Risk Management Quiz

Quiz
•
9th Grade - University
20 questions
Sports 1 Licensing for profit

Quiz
•
KG - University
15 questions
Module 3 - Internal Control Systems

Quiz
•
University
15 questions
Auditing theories

Quiz
•
University
10 questions
Supply Chain Management Quiz

Quiz
•
University
20 questions
computer organization

Quiz
•
University
20 questions
Q1: Conceptual Framework for Financial Reporting 2018

Quiz
•
8th Grade - University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade