
CYB125 - Ch1

Quiz
•
Information Technology (IT)
•
University
•
Medium

Anonymous Anonymous
Used 4+ times
FREE Resource
41 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term describes the level of exposure to some event that has an effect on an asset, usually the likelihood that something bad will happen to an asset?
Risk
Countermeasure
Vulnerability
Threat
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Bob is the information security and compliance manager for a financial institution. Which regulation is most likely to directly apply to Bob's employer?
Federal Information Security Management Act (FISMA)
Health Insurance Portability and Accountability Act (HIPAA)
Children's Internet Protection Act (CIPA)
Gramm-Leach-Bliley Act (GLBA)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Rachel is investigating an information security incident that took place at the high school where she works. She suspects that students may have broken into the student records system and altered their grades. If that is correct, which one of the tenets of information security did this attack violate?
Confidentiality
Integrity
Availability
Nonrepudiation
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What measures the average amount of time between failures for a particular system?
Uptime
Mean time to failure (MTTF)
Mean time to repair (MTTR)
Recovery time objective (RTO)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Juan’s web server was down for an entire day in April. It experienced no other downtime during that month. What represents the web server uptime for that month?
96.67%
93.33%
99.96%
1.03%
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In which domain of a typical IT infrastructure is the first layer of defense for a layered security strategy?
User Domain
Workstation Domain
LAN Domain
WAN Domain
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security control is most helpful in protecting against eavesdropping on wide area network (WAN) transmissions?
Applying filters on exterior Internet Protocol (IP) stateful firewalls
Deploying an intrusion detection system/intrusion prevention system (IDS/IPS)
Blocking Transmission Control Protocol (TCP) synchronize (SYN) open connections
Encrypting transmissions with virtual private networks (VPNs)
Create a free account and access millions of resources
Similar Resources on Wayground
40 questions
Kuis_03_IoT Bab 5-6

Quiz
•
University
40 questions
Intro to Computing Quiz Item 40

Quiz
•
University
40 questions
Long Quiz # 2 System Administration Activities

Quiz
•
University
39 questions
Networking Week 6

Quiz
•
3rd Grade - University
40 questions
Quiz-Applied OS

Quiz
•
University
45 questions
Mạng máy tính

Quiz
•
University
42 questions
Multimedia Summative Quiz-C1

Quiz
•
University
40 questions
Икт рк1

Quiz
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Information Technology (IT)
10 questions
Would you rather...

Quiz
•
KG - University
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
10 questions
The Constitution, the Articles, and Federalism Crash Course US History

Interactive video
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
16 questions
Water Modeling Activity

Lesson
•
11th Grade - University
10 questions
ACT English prep

Quiz
•
9th Grade - University