A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

Professional Development

27 Qs

quiz-placeholder

Similar activities

IT support level-1 (MCQ-2)

IT support level-1 (MCQ-2)

Professional Development

25 Qs

C module 1 second quiz

C module 1 second quiz

Professional Development

25 Qs

Komputer Jaringan Dasar

Komputer Jaringan Dasar

1st Grade - Professional Development

30 Qs

Cloud Computing for SA - Quiz 2

Cloud Computing for SA - Quiz 2

Professional Development

23 Qs

msp quiz

msp quiz

University - Professional Development

23 Qs

Safety Exam 2022

Safety Exam 2022

Professional Development

23 Qs

IoT Quiz - 1

IoT Quiz - 1

University - Professional Development

25 Qs

HTML Basique 2

HTML Basique 2

Professional Development

23 Qs

A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

Assessment

Passage

Computers

Professional Development

Hard

Created by

Brock McKinley

FREE Resource

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three properties of secure information, according to the CIA triad?

Confidentiality, integrity, and authentication

Confidentiality, integrity, and availability

Confidentiality, accessibility, and authenticity

Confidentiality, reliability, and authorization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term specifically refers to controls that protect against attacks on computer storage and processing systems?

Information security

Cybersecurity

Network security

Data encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of hardening a system?

To make it more user-friendly

To increase its attack surface

To make it more secure

To reduce its accessibility

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a vulnerability?

A potential threat actor

A security policy

A weakness that could be exploited

A secure configuration

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack relies on obtaining information about the network and its security controls?

Footprinting

Spoofing

Phishing

Shoulder surfing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a cryptographic hash?

To encrypt data

To verify data integrity

To generate a digital signature

To exchange encryption keys

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of encryption uses a single secret key for both encryption and decryption?

Asymmetric encryption

Triple DES

Symmetric encryption

RSA encryption

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?