Cybersecurity Concepts

Cybersecurity Concepts

Professional Development

10 Qs

quiz-placeholder

Similar activities

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

15 Qs

CCNA Security IINS Chapter 1 Quiz

CCNA Security IINS Chapter 1 Quiz

Professional Development

10 Qs

CompTIA Security+ 11-20

CompTIA Security+ 11-20

Professional Development

10 Qs

SLOT 1: Foundation 1

SLOT 1: Foundation 1

Professional Development

10 Qs

Quiz

Quiz

Professional Development

10 Qs

Basics of Cybersecurity

Basics of Cybersecurity

Professional Development

15 Qs

CEH Pre Assessment

CEH Pre Assessment

Professional Development

10 Qs

Cybersecurity Concepts

Cybersecurity Concepts

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Hisquare Group

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

The need to ensure that information is only available to the right people without a leak is referred to as

Integrity

Availability

Security

Confidentiality

2.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

The need to ensure that information is only available anytime it is needed is referred to as

Integrity

Availability

Security

Confidentiality

3.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

The need to ensure that information is not tampered with in-transit is referred to as

Integrity

Availability

Security

Confidentiality

4.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

A loophole which an attacker can use to gain access to a system would be referred to as

Vulnerability

Threat

Exploit

Worm

Answer explanation

5.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What would you call an attack that does not allow legitimate user access to a service?

Cross-site scripting

Denial of service

Buffer overflow

Virus attack

Answer explanation

6.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What would you call an attack that does not allow legitimate user access to a service?

Cross-site scripting

Denial of service

Buffer overflow

Virus attack

Answer explanation

7.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What would you call data when you are sending money from one bank account to another?

Data at rest

Data in storage

Data in transit

Data in process

Answer explanation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?