Security Awareness Week I

Security Awareness Week I

Professional Development

28 Qs

quiz-placeholder

Similar activities

Cantilever Design Vocabulary Quiz

Cantilever Design Vocabulary Quiz

8th Grade

25 Qs

Qualifier Set B

Qualifier Set B

University

25 Qs

Chapter 5 Network Security (recap)

Chapter 5 Network Security (recap)

12th Grade

30 Qs

Reporting accidents and incidents at work (RIDDOR)

Reporting accidents and incidents at work (RIDDOR)

KG - University

32 Qs

Measurement, Pressure, and Levers Worksheet

Measurement, Pressure, and Levers Worksheet

10th Grade

24 Qs

HEALTH AND SAFETY IN THE ENGINEERING WORKPLACE QUIZ

HEALTH AND SAFETY IN THE ENGINEERING WORKPLACE QUIZ

2nd Grade

24 Qs

201 Mock Quiz

201 Mock Quiz

10th Grade

26 Qs

ToolingU - Essentials of Leadership 100

ToolingU - Essentials of Leadership 100

10th Grade

28 Qs

Security Awareness Week I

Security Awareness Week I

Assessment

Quiz

Engineering

Professional Development

Practice Problem

Easy

Created by

JESSICA alvarez

Used 10+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 5 pts

provides tracking (“audit trail”) of events

accounting

threat actor:

threat agent:

threat likelihood:

2.

MULTIPLE CHOICE QUESTION

15 mins • 5 pts

a new class of attacks that use innovative attack tools and once a system is infected, they silently extract data over an extended period of time

Advanced Persistent Threat (APT)

Sarbanes-Oxley Act (Sarbox):

script kiddie:

threat:

3.

MULTIPLE CHOICE QUESTION

15 mins • 5 pts

an item that has value

identity theft:

asset:

insider:

integrity:

4.

MULTIPLE CHOICE QUESTION

15 mins • 5 pts

_______________a pathway used by a threat actor to penetrate a system

hacker:

attack vector:

hactivists:

Health Insurance Portability and Accountability Act (HIPAA):

5.

MULTIPLE CHOICE QUESTION

15 mins • 5 pts

_________________ensures that the individual is who she claims to be (the authentic or genuine person)

brokers:

confidentiality: cybercriminal:

authentication:

cybersecurity:

cyberterrorism:

6.

MULTIPLE CHOICE QUESTION

15 mins • 5 pts

_____________providing permission or approval to specific technology resources

authorization:

accounting:

Advanced Persistent Threat (APT):

asset:

7.

MULTIPLE CHOICE QUESTION

15 mins • 5 pts








_________________ ensures that data is accessible to only authorized users and not to unapproved individuals

AVAILABILITY

V ECTOR

AGENT

AUTHORITY

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?