CNAG | Cybersecuity

CNAG | Cybersecuity

University

5 Qs

quiz-placeholder

Similar activities

 Chapter 5 Database Management Quiz

Chapter 5 Database Management Quiz

University

10 Qs

Technology in Educational Assessments

Technology in Educational Assessments

9th Grade - University

6 Qs

Eduvos Intro to IS Chapter 7 & 8

Eduvos Intro to IS Chapter 7 & 8

University

8 Qs

JARINGAN KOMPUTER DAN INTERNET

JARINGAN KOMPUTER DAN INTERNET

10th Grade - University

9 Qs

TWIM Part 1

TWIM Part 1

University

10 Qs

Parts of a Computer: Operating System Functions

Parts of a Computer: Operating System Functions

9th Grade - University

10 Qs

Examen Diagnóstico de Redes WAN

Examen Diagnóstico de Redes WAN

University

10 Qs

Wireless and Mobile Networks - Session 15 - 16

Wireless and Mobile Networks - Session 15 - 16

University

10 Qs

CNAG | Cybersecuity

CNAG | Cybersecuity

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

ALBERT VENDIOLA

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What are the main goals of cybersecurity?

CIA: Classified, Intelligence, Authorization

CIA: Centralized, Integrity, Accessible

CIA: Confidentiality, Integrity, Availability

CIA: Containability, Integrity, Authentication

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is goal of cybersecurity that is related to secrecy?

Confidentiality

Integrity

Availability

Authenticity

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the assessment type that refers to carrying out the project within the network?

Internal Network Assessment

Inner Operability Network Assessment

External Network Assessment

Exposed Network Assessment

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What the testing method that provides you the broad view of the network?

Black box testing

White box testing

Gray box testing

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What the testing method that provides you the broad view of the network?

Documentation-Reconnaissance-Post

Exploitation-Remediation

Scanning-Assessment-Patching-Validation

Discover-Vulnerability Assessment-Exploit-Post Exploitation