IC 2025 Exam Review

IC 2025 Exam Review

University

35 Qs

quiz-placeholder

Similar activities

Decision and Case Control Statements in C

Decision and Case Control Statements in C

University

35 Qs

PRANATA KOMPUTER

PRANATA KOMPUTER

University

31 Qs

Midterm Exam - Discrete Math

Midterm Exam - Discrete Math

University

35 Qs

TIK kelas 7, Penilaian Tengah semester

TIK kelas 7, Penilaian Tengah semester

7th Grade - University

40 Qs

C++ Internal Assessment

C++ Internal Assessment

University

40 Qs

Thinking in HTML

Thinking in HTML

University

30 Qs

Engineering Eye

Engineering Eye

University

30 Qs

REDES TELEMÁTICAS-2020-II

REDES TELEMÁTICAS-2020-II

University

34 Qs

IC 2025 Exam Review

IC 2025 Exam Review

Assessment

Quiz

Computers

University

Medium

Created by

Jason Clifford

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do breaches affect an organization?

Reputation Loss

Financial Impact

Legal Liability

All of the Above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some potential impacts of a cybersecurity breach?

Financial loss due to theft or destruction of data

Damage to reputation and loss of customer trust

Legal and regulatory penalties for non-compliance

All of the Above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the correct equation for risk?

Confidentiality + integrity + availability = risk

Asset + vulnerability + threat = risk

Risk management + asset management = risk

Vector + asset + credentials = risk

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which aspect of the CIA triad ensures data accuracy?

Instantiation

Inheritance

Intergrity

Iteration

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the "A" in the CIA triad stand for?

Approvals

Availability

Accounts

Agency

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which circumstance(s) can be considered as a common threat vector?

Phishing emails

Malware-infected attachments

Outdated software and hardware

All of the Above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware can self-replicate across a network?

Worm

Adware

Spyware

Virus

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?