ACS - Threats, Vulnerabilities, & Mitigation - Overview

ACS - Threats, Vulnerabilities, & Mitigation - Overview

9th Grade

85 Qs

quiz-placeholder

Similar activities

Computer Science 3rd form Dec 2021

Computer Science 3rd form Dec 2021

8th - 9th Grade

90 Qs

Computer System Prep

Computer System Prep

9th - 12th Grade

90 Qs

GCSE revision questions (self created)

GCSE revision questions (self created)

9th - 12th Grade

83 Qs

ACS - Threats, Vulnerabilities, & Mitigation - Overview

ACS - Threats, Vulnerabilities, & Mitigation - Overview

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Andrew Schmitz

FREE Resource

85 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best defines a nation-state threat actor?

An individual hacker motivated by personal revenge

A government-sponsored group conducting cyberattacks

A criminal organization focused on financial gain

An insider with access to sensitive data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common motivation for script kiddies?

Espionage

Financial gain

Desire for recognition among peers

Political beliefs

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a physical security control?

Firewall

Biometric scanner

Encryption

Two-factor authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym AAA stand for in cybersecurity?

Authenticate, Authorize, Account

Access, Audit, Assess

Analyze, Alert, Adapt

Attack, Alert, Announce

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company's website is targeted by a DDoS attack. What is the primary goal of this type of attack?

Theft of customer data

Service disruption

Insertion of malware

Espionage

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the motivation behind a financial gain-driven attack?

Espionage

Service Disruption

Blackmail

Data Exfiltration

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common mitigation strategy against a Distributed Denial of Service (DDoS) attack?

Installing a firewall

Applying multi-factor authentication

Using load balancers and traffic filtering

Deploying endpoint protection software

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?