Confidentiality and integrity are two important properties of information stored in a secure retrieval system. What is the third property?

Lesson 16

Quiz
•
Computers
•
Professional Development
•
Medium
Christina McCain
Used 7+ times
FREE Resource
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Information
Accessibility
Authorization
Availability
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or false? The level of risk from zero-day attacks is only significant with respect to EOL systems.
True
False
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A threat actor crafts an email addressed to a senior support technician inviting him to register for free football coaching advice. The website contains password-stealing malware. What is the name of this type of attack?
Phishing
Tailgating
Impersonation
Spear phishing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are assisting with the development of end-user security awareness documentation. Covertly observing someone type a PIN or password or other confidential data is called what?
Social engineering
Shoulder surfing
Piggybacking
Tailgating
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
You discover that a threat actor has been able to harvest credentials from some visitors connecting to the company’s wireless network from the lobby. The visitors had connected to a network named “Internet” and were presented with a web page requesting an email address and password to enable guest access. The company’s access point had been disconnected from the cabled network. What type of attack has been perpetrated?
Evil twin
On-path attack
MITM
SQL injection
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A threat actor recovers some documents via dumpster diving and learns that the system policy causes passwords to be configured with a random mix of different characters that are only five characters in length. To what type of password cracking attack is this vulnerable?
Social engineering
Human-hacking
Brute force
Dictionary
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of cryptographic key is delivered in a digital certificate?
Digital key
Public key
Private key
Decrypt key
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
Cyber Security Quiz

Quiz
•
Professional Development
20 questions
Cloud services

Quiz
•
Professional Development
16 questions
Cyber Resilience Training

Quiz
•
Professional Development
20 questions
ITF+ Ch8, Network Concepts & Technologies

Quiz
•
Professional Development
20 questions
Linux Managing Systems

Quiz
•
Professional Development
14 questions
cyber security

Quiz
•
KG - Professional Dev...
20 questions
MTA: 98-367 Security Part 1

Quiz
•
KG - Professional Dev...
20 questions
ITF+ Ch9, Security Concepts & Threats

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade