
1 - Introduction to Cyber Security
Authored by Fikri S
Other
12th Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
21 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main goal of Information Security?
Prevention
Detection
Recovery
Authorization
Answer explanation
The main goal of Information Security is Prevention, which focuses on stopping security incidents before they occur.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the concept that indicates exposure to the chance of damage or loss?
Risk
Vulnerabilities
Threats
Attacks
Answer explanation
The concept that indicates exposure to the chance of damage or loss is 'Risk'. It encompasses vulnerabilities, threats, and potential attacks.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are conditions that leave a device open to harm called?
Vulnerabilities
Threats
Attacks
Controls
Answer explanation
Conditions that leave a device open to harm are called vulnerabilities, making it the correct choice.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a technique used to exploit a vulnerability without authorization?
Vulnerabilities
Controls
Attacks
Threats
Answer explanation
Attacks are the technique used to exploit a vulnerability without authorization, making it the correct choice among the options provided.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are countermeasures put in place to avoid security risks called?
Controls
Attacks
Vulnerabilities
Threats
Answer explanation
Countermeasures put in place to avoid security risks are called controls.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the process of determining what rights and privileges an entity has?
Authentication
Authorization
Identification
Recovery
Answer explanation
Authorization is the process of determining what rights and privileges an entity has.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the process of transforming plaintext to ciphertext that cannot be directly decrypted?
Steganography
Decryption
Encryption
Hashing
Answer explanation
The process of transforming plaintext to ciphertext that cannot be directly decrypted is known as hashing. Hashing is a one-way function that converts data into a fixed-size string of bytes.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?