2024-25-2S-PROF1-ME

2024-25-2S-PROF1-ME

60 Qs

quiz-placeholder

Similar activities

中二級歷史科EXAM1史識溫習

中二級歷史科EXAM1史識溫習

9th Grade

61 Qs

8 сынып 4-бөлім.Программаларды құрудың кіріктірілген орталары

8 сынып 4-бөлім.Программаларды құрудың кіріктірілген орталары

KG - University

60 Qs

Entrepreneurship Final Spring 2024

Entrepreneurship Final Spring 2024

KG - University

55 Qs

高中史識溫習: 第一次世界大戰

高中史識溫習: 第一次世界大戰

KG - University

56 Qs

KISI-KISI PSAS Photoshop

KISI-KISI PSAS Photoshop

9th - 12th Grade

62 Qs

TEMA 3 _ EL PROCÈS TECNOLÒGIC

TEMA 3 _ EL PROCÈS TECNOLÒGIC

8th Grade

60 Qs

Lewis Structures - bonds - nomenclature

Lewis Structures - bonds - nomenclature

KG - University

61 Qs

8 сынып 3-бөлім.Ақпаратты электронды кестелерде өңдеу

8 сынып 3-бөлім.Ақпаратты электронды кестелерде өңдеу

KG - University

59 Qs

2024-25-2S-PROF1-ME

2024-25-2S-PROF1-ME

Assessment

Quiz

others

Medium

Created by

Rosso Cuyos

Used 1+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary goal of cybersecurity?
a) Speed
b) Confidentiality, Integrity, Availability
c) Scalability
d) Redundancy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common vector for cyberattacks?
a) Software vulnerabilities
b) Social engineering
c) Physical breaches
d) Network sniffing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A zero-day vulnerability refers to:
a) A known vulnerability with no fix.
b) An unknown vulnerability exploited before discovery.
c) A patched vulnerability.
d) A vulnerability in outdated systems.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in risk management?
a) Risk analysis
b) Risk identification
c) Risk mitigation
d) Risk assessment

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which risk response involves transferring the risk to another party?
a) Avoidance
b) Mitigation
c) Acceptance
d) Transference

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The probability of a threat exploiting a vulnerability is defined as:
a) Impact
b) Likelihood
c) Exposure
d) Residual risk

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?
a) Malware spreading over a network.
b) An attempt to acquire sensitive data by masquerading as a trustworthy entity.
c) Brute-forcing passwords.
d) Planting spyware.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?