CYB125 - Ch3

CYB125 - Ch3

University

36 Qs

quiz-placeholder

Similar activities

Summative 1 Crypto currency

Summative 1 Crypto currency

11th Grade - University

32 Qs

Encryption/Decryption

Encryption/Decryption

University

40 Qs

HPC 202/ TPC 202- Quiz # 1

HPC 202/ TPC 202- Quiz # 1

University

40 Qs

Information Management-MidQuiz

Information Management-MidQuiz

University

31 Qs

Form 1 - Information Technology Quiz

Form 1 - Information Technology Quiz

7th Grade - University

32 Qs

Computer System Architecture

Computer System Architecture

University

35 Qs

CYB125 - Ch8

CYB125 - Ch8

University

39 Qs

Integrated Application Software Prefinals

Integrated Application Software Prefinals

12th Grade - University

41 Qs

CYB125 - Ch3

CYB125 - Ch3

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Damon Vogel

Used 1+ times

FREE Resource

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows a cross-site scripting attack against the server. What term describes the issue that Adam discovered?

Threat

Vulnerability

Risk

Impact

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes an action that can damage or compromise an asset?

Risk

Vulnerability

Countermeasure

Threat

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Purchasing an insurance policy is an example of the ____________ risk management strategy.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Aditya is the security manager for a mid-sized business. The company has suffered several serious data losses when laptops were stolen. Aditya decides to implement full disk encryption on all laptops. What risk response did Aditya take?

Reduce

Transfer

Accept

Avoid

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Residual Risk describes the risk that exists after an organization has performed all planned countermeasures and controls?

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Violet deploys an intrusion prevention system (IPS) on her network as a security control. What type of control has Violet deployed?

Detective

Preventive

Corrective

Deterrent

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an alteration threat?

Espionage

System or data modification

Intentional information leak

Denial of service

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?