
Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity
Authored by Gordon Bjorman
Computers
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
In the CIA triad, what does "Integrity" address?
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Compliance rules are one of the primary concerns for information & cyber security professionals as existing rules are enforced and new laws are created.
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Business Risk is determined by…
information + availability + defense
vulnerability + attacks + remediation
assets + vulnerability + threat
assessment + information + defense
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
The process used to understand the nature and extent of risk is…
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
For automobile companies, a microchip shortage could be categorized as what type of risk
Pandemic
Industry
Compliance
Digital
6.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What type of attack gives hackers remote control of a device?
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Hackers that use their abilities to support an ideological agenda are categorized as…
Nation State Threat Actors
Hacktivists
Unethical Hackers
APT's
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?