Search Header Logo

Thy Quiz

Authored by Harry Nguyen

English

University

Thy Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

78 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

A potential weakness in an asset or its defensive control system(s) is known as a vulnerability (1 word).

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

The probability of an unwanted occurrence, such as an adverse event or loss, is known as a risk (1 word).

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Network security focuses on the protection of physical items, objects, or areas from unauthorized access and misuse.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A breach of possession may not always result in a breach of confidentiality.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as ___________.

physical security

communications security

information security

network security

6.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Any event or circumstance that has the potential to adversely affect operations and assets is known as a threat (1 word).

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technique used to compromise a system is known as a ___________.

asset

access method

risk

exploit

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?