Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Professional Development

12 Qs

quiz-placeholder

Similar activities

Pengenalan Internet

Pengenalan Internet

Professional Development

14 Qs

Guess the Video Game Pets 1

Guess the Video Game Pets 1

KG - Professional Development

13 Qs

Wealth Showcases - VII

Wealth Showcases - VII

Professional Development

11 Qs

Snapdragon Academy

Snapdragon Academy

Professional Development

10 Qs

Kuis Digitalisasi Pembelajaran

Kuis Digitalisasi Pembelajaran

Professional Development

10 Qs

Stepping Into Data Science Arena

Stepping Into Data Science Arena

KG - Professional Development

10 Qs

Database SQL Part 1 V1

Database SQL Part 1 V1

Professional Development

13 Qs

Public Key Infrastructure

Public Key Infrastructure

Professional Development

10 Qs

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Gordon Bjorman

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image
In the CIA triad, what does "Integrity" address?
Makes information accessible to only authorized persons
Makes sure information is not changed
Makes sure information is accesible when needed
None Of the Above

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Compliance rules are one of the primary concerns for information & cyber security professionals as existing rules are enforced and new laws are created.

True
False

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Business Risk is determined by…

information + availability + defense

vulnerability + attacks + remediation

assets + vulnerability + threat

assessment + information + defense

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image
The process used to understand the nature and extent of risk is…
Risk appetite
Control baseline
Risk avoidance
Risk assessment

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

For automobile companies, a microchip shortage could be categorized as what type of risk

Pandemic

Industry

Compliance

Digital

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image
What type of attack gives hackers remote control of a device?
Keylogger
Vishing
Rootkit
Worm

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Hackers that use their abilities to support an ideological agenda are categorized as…

Nation State Threat Actors

Hacktivists

Unethical Hackers

APT's

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?