Search Header Logo

1 - Introduction to Cyber Security

Authored by Fikri S

Other

12th Grade

Used 5+ times

1 - Introduction to Cyber Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Information Security?

Prevention

Detection

Recovery

Authorization

Answer explanation

The main goal of Information Security is Prevention, which focuses on stopping security incidents before they occur.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the concept that indicates exposure to the chance of damage or loss?

Risk

Vulnerabilities

Threats

Attacks

Answer explanation

The concept that indicates exposure to the chance of damage or loss is 'Risk'. It encompasses vulnerabilities, threats, and potential attacks.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are conditions that leave a device open to harm called?

Vulnerabilities

Threats

Attacks

Controls

Answer explanation

Conditions that leave a device open to harm are called vulnerabilities, making it the correct choice.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a technique used to exploit a vulnerability without authorization?

Vulnerabilities

Controls

Attacks

Threats

Answer explanation

Attacks are the technique used to exploit a vulnerability without authorization, making it the correct choice among the options provided.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are countermeasures put in place to avoid security risks called?

Controls

Attacks

Vulnerabilities

Threats

Answer explanation

Countermeasures put in place to avoid security risks are called controls.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of determining what rights and privileges an entity has?

Authentication

Authorization

Identification

Recovery

Answer explanation

Authorization is the process of determining what rights and privileges an entity has.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of transforming plaintext to ciphertext that cannot be directly decrypted?

Steganography

Decryption

Encryption

Hashing

Answer explanation

The process of transforming plaintext to ciphertext that cannot be directly decrypted is known as hashing. Hashing is a one-way function that converts data into a fixed-size string of bytes.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?