Which of the following best defines a vulnerability in cybersecurity?
Cisco CCST Objective 1

Quiz
•
Computers
•
12th Grade
•
Easy

Brian Nanns
Used 9+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A. An action that causes damage to a system.
B. A weakness that can be exploited by threats.
C. A protective measure against cyberattacks.
D. A process for encrypting sensitive data.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the three components of the CIA Triad?
Confidentiality, Integrity, and Availability.
Control, Identification, and Authorization.
Cryptography, Intrusion Detection, and Access Control.
Compliance, Inspection, and Authentication.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack involves sending deceptive emails to trick users into revealing sensitive information?
Phishing
Denial of Service (DoS)
Brute Force Attack
Man-in-the-Middle Attack
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security principle refers to applying multiple layers of security controls to protect systems?
A. Principle of Least Privilege
B. Zero Trust Security
C. Defense-in-Depth
D. Single Sign-On
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of hardening a system?
To remove outdated hardware components
To make a system more resilient against attacks
To allow external users easier access
To decrease the complexity of security controls
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of an insider threat?
A. A hacker using brute force to guess passwords.
B. An employee leaking confidential data to competitors.
C. A botnet performing a denial-of-service attack.
D. A phishing attack targeting an organization's employees.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes an Advanced Persistent Threat (APT)?
A. A short-lived attack that exploits system misconfigurations.
B. A low-level threat that affects individual devices.
C. A continuous, stealthy attack by a skilled adversary.
D. A ransomware attack that encrypts data and demands payment.
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Found. of IT: Security Threats - A

Quiz
•
9th - 12th Grade
10 questions
Staying Safe on the Internet

Quiz
•
10th - 12th Grade
10 questions
Cyber Security Quiz

Quiz
•
12th Grade
15 questions
DETECTING AND PREVENTING CYBER SECURITY THREATS

Quiz
•
9th - 12th Grade
10 questions
Understanding Cybersecurity

Quiz
•
5th Grade - Professio...
12 questions
CamTech Network Security

Quiz
•
8th - 12th Grade
10 questions
Computer Ethics and Security

Quiz
•
9th - 12th Grade
10 questions
Cybersecurity Quiz for Tech Integrators

Quiz
•
12th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University