Search Header Logo

ITS Network Security PT1

Authored by Ryan Starling

Computers

Professional Development

Used 4+ times

ITS Network Security PT1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the core security principles that form the foundation of cybersecurity?

Confidentiality, integrity, availability, non-repudiation

Confidentiality, integrity, risk, vulnerability

Integrity, availability, threat, risk

Confidentiality, non-repudiation, vulnerability, principle of least privilege

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of security control involves physical barriers and access restrictions to protect a facility or equipment?

Administrative controls

Technical controls

Site security

Computer security

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a type of backup that only saves the data that has changed since the last backup regardless of type?

Differential backup

Incremental backup

Full backup

Partial backup

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves injecting malicious code into a web application to steal data or perform unauthorized actions?

Man-in-the-middle (MITM)

Brute force attack

SQL injection

Cross-site scripting (XSS)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a type of malware that encrypts a user's files and demands payment for their release?

Viruses

Ransomware

Spyware

Rootkits

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of security control involves setting user permissions to only allow access to the resources necessary for their role?

Administrative controls

Technical controls

Site security

Computer security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a type of attack that floods a system with traffic to make it unavailable to users?

Buffer overflow

Man-in-the-middle (MITM)

Polymorphic viruses

Denial-of-service (DoS) attacks

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?