Cybersecurity Concepts

Cybersecurity Concepts

Professional Development

10 Qs

quiz-placeholder

Similar activities

OSI Security Architecture

OSI Security Architecture

Professional Development

10 Qs

CCNA Security Pre-Assessment

CCNA Security Pre-Assessment

Professional Development

15 Qs

Kali Linux Quiz 4

Kali Linux Quiz 4

Professional Development

8 Qs

Level 5 - Security Overview Quiz

Level 5 - Security Overview Quiz

Professional Development

7 Qs

Week 2

Week 2

Professional Development

11 Qs

Cybersecurity Fundamentals

Cybersecurity Fundamentals

Professional Development

15 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

15 Qs

Security+ Study Guide-10 Understanding Cryptography and PKI

Security+ Study Guide-10 Understanding Cryptography and PKI

Professional Development

15 Qs

Cybersecurity Concepts

Cybersecurity Concepts

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Hisquare Group

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

The need to ensure that information is only available to the right people without a leak is referred to as

Integrity

Availability

Security

Confidentiality

2.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

The need to ensure that information is only available anytime it is needed is referred to as

Integrity

Availability

Security

Confidentiality

3.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

The need to ensure that information is not tampered with in-transit is referred to as

Integrity

Availability

Security

Confidentiality

4.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

A loophole which an attacker can use to gain access to a system would be referred to as

Vulnerability

Threat

Exploit

Worm

Answer explanation

5.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What would you call an attack that does not allow legitimate user access to a service?

Cross-site scripting

Denial of service

Buffer overflow

Virus attack

Answer explanation

6.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What would you call an attack that does not allow legitimate user access to a service?

Cross-site scripting

Denial of service

Buffer overflow

Virus attack

Answer explanation

7.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What would you call data when you are sending money from one bank account to another?

Data at rest

Data in storage

Data in transit

Data in process

Answer explanation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?