ITS Network Security PT1

ITS Network Security PT1

Professional Development

17 Qs

quiz-placeholder

Similar activities

Intro to Cybersecurity - Review 2

Intro to Cybersecurity - Review 2

Professional Development

20 Qs

Cyber Security

Cyber Security

Professional Development

20 Qs

LAN Security

LAN Security

9th Grade - Professional Development

12 Qs

Cyber 2 Module 9

Cyber 2 Module 9

9th Grade - Professional Development

21 Qs

Security+ 701 - Quiz 2

Security+ 701 - Quiz 2

Professional Development

15 Qs

DECI - Week 15 - round

DECI - Week 15 - round

Professional Development

14 Qs

 Review ITNS 2 part 2

Review ITNS 2 part 2

9th Grade - Professional Development

13 Qs

Malware

Malware

Professional Development

15 Qs

ITS Network Security PT1

ITS Network Security PT1

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Ryan Starling

Used 4+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the core security principles that form the foundation of cybersecurity?

Confidentiality, integrity, availability, non-repudiation

Confidentiality, integrity, risk, vulnerability

Integrity, availability, threat, risk

Confidentiality, non-repudiation, vulnerability, principle of least privilege

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of security control involves physical barriers and access restrictions to protect a facility or equipment?

Administrative controls

Technical controls

Site security

Computer security

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a type of backup that only saves the data that has changed since the last backup regardless of type?

Differential backup

Incremental backup

Full backup

Partial backup

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves injecting malicious code into a web application to steal data or perform unauthorized actions?

Man-in-the-middle (MITM)

Brute force attack

SQL injection

Cross-site scripting (XSS)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a type of malware that encrypts a user's files and demands payment for their release?

Viruses

Ransomware

Spyware

Rootkits

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of security control involves setting user permissions to only allow access to the resources necessary for their role?

Administrative controls

Technical controls

Site security

Computer security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a type of attack that floods a system with traffic to make it unavailable to users?

Buffer overflow

Man-in-the-middle (MITM)

Polymorphic viruses

Denial-of-service (DoS) attacks

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?