Thy Quiz

Thy Quiz

University

78 Qs

quiz-placeholder

Similar activities

4.8 My Clothes

4.8 My Clothes

4th Grade - University

79 Qs

TOEIC B - SESSION 8

TOEIC B - SESSION 8

University

74 Qs

TOEIC B- SESSION 11

TOEIC B- SESSION 11

University

81 Qs

Spring 22 Intermediate Final Exam Review

Spring 22 Intermediate Final Exam Review

12th Grade - University

75 Qs

Study Skills Final Exam Review

Study Skills Final Exam Review

12th Grade - University

77 Qs

English рубежка (2 семестр №1)

English рубежка (2 семестр №1)

University

75 Qs

PROVINCE E4-01

PROVINCE E4-01

4th Grade - University

76 Qs

GRAMMAR DIAGNOSTIC TEST 2022

GRAMMAR DIAGNOSTIC TEST 2022

University

81 Qs

Thy Quiz

Thy Quiz

Assessment

Quiz

English

University

Practice Problem

Hard

Created by

Harry Nguyen

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

78 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

A potential weakness in an asset or its defensive control system(s) is known as a vulnerability (1 word).

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

The probability of an unwanted occurrence, such as an adverse event or loss, is known as a risk (1 word).

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Network security focuses on the protection of physical items, objects, or areas from unauthorized access and misuse.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A breach of possession may not always result in a breach of confidentiality.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as ___________.

physical security

communications security

information security

network security

6.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Any event or circumstance that has the potential to adversely affect operations and assets is known as a threat (1 word).

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technique used to compromise a system is known as a ___________.

asset

access method

risk

exploit

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?