IC 2025 Exam Review

IC 2025 Exam Review

University

35 Qs

quiz-placeholder

Similar activities

Prueba de IP Addressing y Subnetting

Prueba de IP Addressing y Subnetting

University

30 Qs

TRUY VẤN DỮ LIỆU

TRUY VẤN DỮ LIỆU

12th Grade - University

40 Qs

IT security - 3

IT security - 3

9th Grade - University

30 Qs

Quiz#8: Elements of Film Form

Quiz#8: Elements of Film Form

University

31 Qs

TIK Kelas 7 Bab 1 Sem Ganjil

TIK Kelas 7 Bab 1 Sem Ganjil

7th Grade - University

30 Qs

Lesson 5 - Software Quality Assurance

Lesson 5 - Software Quality Assurance

University

30 Qs

POST TEST - MULTIMEDIA INTERAKTIF TI 21 B

POST TEST - MULTIMEDIA INTERAKTIF TI 21 B

University

40 Qs

CS 1: Big Idea #3 Practice

CS 1: Big Idea #3 Practice

9th Grade - University

32 Qs

IC 2025 Exam Review

IC 2025 Exam Review

Assessment

Quiz

Computers

University

Medium

Created by

Jason Clifford

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do breaches affect an organization?

Reputation Loss

Financial Impact

Legal Liability

All of the Above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some potential impacts of a cybersecurity breach?

Financial loss due to theft or destruction of data

Damage to reputation and loss of customer trust

Legal and regulatory penalties for non-compliance

All of the Above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the correct equation for risk?

Confidentiality + integrity + availability = risk

Asset + vulnerability + threat = risk

Risk management + asset management = risk

Vector + asset + credentials = risk

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which aspect of the CIA triad ensures data accuracy?

Instantiation

Inheritance

Intergrity

Iteration

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the "A" in the CIA triad stand for?

Approvals

Availability

Accounts

Agency

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which circumstance(s) can be considered as a common threat vector?

Phishing emails

Malware-infected attachments

Outdated software and hardware

All of the Above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware can self-replicate across a network?

Worm

Adware

Spyware

Virus

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?