A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

Professional Development

27 Qs

quiz-placeholder

Similar activities

NETWORKS

NETWORKS

Professional Development

25 Qs

Cengage CompTIA A+ Guide to Technical Support

Cengage CompTIA A+ Guide to Technical Support

Professional Development

25 Qs

Quiz 1A: Compare and Contrast OSI Model Layers

Quiz 1A: Compare and Contrast OSI Model Layers

Professional Development

25 Qs

anime

anime

3rd Grade - Professional Development

26 Qs

3D1X1 CDC Set 1 Vl 1 Unit 2 Review

3D1X1 CDC Set 1 Vl 1 Unit 2 Review

Professional Development

28 Qs

Réseaux 5 - Configuration d'un routeur

Réseaux 5 - Configuration d'un routeur

Professional Development

24 Qs

Assets and Threats: Quiz 3

Assets and Threats: Quiz 3

Professional Development

26 Qs

Topic 12A: Incident Response

Topic 12A: Incident Response

Professional Development

25 Qs

A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

Assessment

Passage

Computers

Professional Development

Hard

Created by

Brock McKinley

FREE Resource

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three properties of secure information, according to the CIA triad?

Confidentiality, integrity, and authentication

Confidentiality, integrity, and availability

Confidentiality, accessibility, and authenticity

Confidentiality, reliability, and authorization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term specifically refers to controls that protect against attacks on computer storage and processing systems?

Information security

Cybersecurity

Network security

Data encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of hardening a system?

To make it more user-friendly

To increase its attack surface

To make it more secure

To reduce its accessibility

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a vulnerability?

A potential threat actor

A security policy

A weakness that could be exploited

A secure configuration

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack relies on obtaining information about the network and its security controls?

Footprinting

Spoofing

Phishing

Shoulder surfing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a cryptographic hash?

To encrypt data

To verify data integrity

To generate a digital signature

To exchange encryption keys

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of encryption uses a single secret key for both encryption and decryption?

Asymmetric encryption

Triple DES

Symmetric encryption

RSA encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?