
Thy Quiz
Authored by Harry Nguyen
English
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
78 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
A potential weakness in an asset or its defensive control system(s) is known as a vulnerability (1 word).
2.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
The probability of an unwanted occurrence, such as an adverse event or loss, is known as a risk (1 word).
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Network security focuses on the protection of physical items, objects, or areas from unauthorized access and misuse.
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A breach of possession may not always result in a breach of confidentiality.
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as ___________.
physical security
communications security
information security
network security
6.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
Any event or circumstance that has the potential to adversely affect operations and assets is known as a threat (1 word).
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A technique used to compromise a system is known as a ___________.
asset
access method
risk
exploit
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?