Mod 2 Risk Adversity Trust

Mod 2 Risk Adversity Trust

9th - 12th Grade

29 Qs

quiz-placeholder

Similar activities

Soal Keamanan Jaringan

Soal Keamanan Jaringan

12th Grade - University

31 Qs

Cloud Services and Security Quiz

Cloud Services and Security Quiz

12th Grade

24 Qs

Structs, Records, and DTOs in C#

Structs, Records, and DTOs in C#

11th Grade

24 Qs

Basic Security Concepts Review

Basic Security Concepts Review

9th - 12th Grade

25 Qs

Dom. Reg Morning 9:45am . Final Exam Living I.T. Era

Dom. Reg Morning 9:45am . Final Exam Living I.T. Era

12th Grade

25 Qs

Unit 9 Exam (The Internet & Cybersecurity)

Unit 9 Exam (The Internet & Cybersecurity)

9th Grade

25 Qs

Soal Pilihan Ganda Keamanan Jaringan (Kelas 11)

Soal Pilihan Ganda Keamanan Jaringan (Kelas 11)

11th Grade

25 Qs

Z MID  Koding dan Kecerdasan Artifisial

Z MID Koding dan Kecerdasan Artifisial

10th Grade

25 Qs

Mod 2 Risk Adversity Trust

Mod 2 Risk Adversity Trust

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Medium

Created by

PJ Johnson

Used 2+ times

FREE Resource

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes why information assets must be identified for cybersecurity purposes?

Because you cannot protect what you have not identified

Because you should only protect what you have identified

Because you can only identify some information assets

Because you should only identify those information assets that are the most important

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes the purpose of a data classification system for cybersecurity?

To ensure filenames are compliant with the naming policy rules

To identify information assets and protect them from a loss of confidentiality, integrity and availability

To describe all possible vulnerabilities in the system

To initiate a threat assessment protocol

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Inappropriate file access to, or disclosure of, protectively marked information, whether by an adversary or accidentally, is a loss of:

Availability

Confidentiality

Integrity

Availability and Confidentiality

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

User error resulting in the access to, modification of, and disclosure confidential information assets represents a loss of:

Confidentiality

Confidentiality and Integrity

Availability and Integrity

Availability

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe ensuring that authorized parties are able to access the information when it is needed?

Confidentiality

Integrity

Availability

Asset identification

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to a circumstance or event with the potential to have an adverse effect on organizational operations?

Threat

Vulnerability

Attack

Exploit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to a weakness in an information system, system security procedures, internal controls, or implementation?

Threat

Vulnerability

Attack

Exploit

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?