A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

Professional Development

27 Qs

quiz-placeholder

Similar activities

CompTIA Security+ Quiz

CompTIA Security+ Quiz

Professional Development

25 Qs

A+ - 15B - Identify Features of macOS

A+ - 15B - Identify Features of macOS

Professional Development

23 Qs

Exploring Security Vulnerabilities and Testing

Exploring Security Vulnerabilities and Testing

Professional Development

30 Qs

week 6 workshop quiz for sec+

week 6 workshop quiz for sec+

University - Professional Development

25 Qs

CompTIA A+ U10

CompTIA A+ U10

9th Grade - Professional Development

27 Qs

1.1 and 1.2 Quiz Cyber

1.1 and 1.2 Quiz Cyber

Professional Development

29 Qs

ITF - Chapter 14 Quiz

ITF - Chapter 14 Quiz

Professional Development

30 Qs

CISSP CH1 Risk Management

CISSP CH1 Risk Management

Professional Development

28 Qs

A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

Assessment

Passage

Computers

Professional Development

Hard

Created by

Brock McKinley

FREE Resource

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three properties of secure information, according to the CIA triad?

Confidentiality, integrity, and authentication

Confidentiality, integrity, and availability

Confidentiality, accessibility, and authenticity

Confidentiality, reliability, and authorization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term specifically refers to controls that protect against attacks on computer storage and processing systems?

Information security

Cybersecurity

Network security

Data encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of hardening a system?

To make it more user-friendly

To increase its attack surface

To make it more secure

To reduce its accessibility

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a vulnerability?

A potential threat actor

A security policy

A weakness that could be exploited

A secure configuration

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack relies on obtaining information about the network and its security controls?

Footprinting

Spoofing

Phishing

Shoulder surfing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a cryptographic hash?

To encrypt data

To verify data integrity

To generate a digital signature

To exchange encryption keys

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of encryption uses a single secret key for both encryption and decryption?

Asymmetric encryption

Triple DES

Symmetric encryption

RSA encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?