
Chapter 13 Quiz 2

Quiz
•
Computers
•
University
•
Easy
Ann Watterson
Used 26+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a threat in network security?
A specific vulnerability in a system
The likelihood of an attack
A potential danger to an asset, such as data or the network itself
A method used to exploit a vulnerability
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the attack surface of a system?
The area of the system physically accessible to an attacker
The total number of vulnerabilities in a system accessible to an attacker
The method used to exploit a vulnerability
The likelihood of a threat exploiting a system vulnerability
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes a local exploit?
An exploit that works over the network without prior access to the system
An exploit where the attacker has some type of user or administrative access to the system
An exploit that requires physical access to the system
An exploit where no account on the network is needed
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does risk avoidance mean in the context of risk management?
Accepting the risk because it costs less than mitigation
Transferring the risk to a third party, such as an insurance company
Reducing the impact of the risk by taking action to lower it
Eliminating the activity or device that presents the risk
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary motivation of black hat hackers?
To identify and report vulnerabilities ethically
To commit crimes without personal gain
To violate computer and network security for personal gain or malicious reasons
To work for the government and gather intelligence
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term refers to inexperienced threat actors using existing scripts or tools to cause harm?
Hacktivists
Vulnerability brokers
Script kiddies
Cybercriminals
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the role of state-sponsored hackers?
They protest social and political ideas
They steal government secrets and sabotage networks of foreign entities
They discover vulnerabilities and report them for rewards
They operate small-scale cybercrime networks
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
Keamanan1 Siber SI

Quiz
•
University
25 questions
Module 1.1: Common Threats

Quiz
•
11th Grade - University
23 questions
Cybersecurity Exam 2 Practice

Quiz
•
University
25 questions
Cybersecurity Fundamentals Practice Quiz

Quiz
•
University
15 questions
Security Presentation Quiz

Quiz
•
12th Grade - University
19 questions
gdsy

Quiz
•
University
20 questions
Cybersecurity MCQs Quiz

Quiz
•
University
18 questions
Cybersecurity Quiz

Quiz
•
University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
21 questions
Spanish-Speaking Countries

Quiz
•
6th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
7 questions
Common and Proper Nouns

Interactive video
•
4th Grade - University
12 questions
Los numeros en español.

Lesson
•
6th Grade - University
7 questions
PC: Unit 1 Quiz Review

Quiz
•
11th Grade - University
7 questions
Supporting the Main Idea –Informational

Interactive video
•
4th Grade - University
12 questions
Hurricane or Tornado

Quiz
•
3rd Grade - University
7 questions
Enzymes (Updated)

Interactive video
•
11th Grade - University