
Matching Quiz #2
Authored by Charles Carr
Instructional Technology
10th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MATCH QUESTION
1 min • 5 pts
Match the following terms to the correct description
Exploit
A code, sequence of commands, or piece of software designed to take advantage of weakness in the system.
Risk
A potential danger or harmful event that could negatively affect the CIA of the network or data
Threat
A weakness or flaw in a system, application, or network that could be taken advantage of by an attacker
Attack Vector
a specific method or pathway used by an attacker to gain unauthorized access to a computer system
Vulnerability
The likelihood and potential impact of a harmful event happening to the network or data.
2.
MATCH QUESTION
1 min • 5 pts
Match the following Cybersecurity principles to appropriate definition.
Hardening
Employing multiple layers of security controls, each designed to detect and prevent attacks at different stages
Principle of Zero Trust
The process of reducing the attack surface of devices, systems or networks.
Defense In Depth
Every access must be authenticated and authorized before being granted access to resources
Principal of Least Privilege
users should only have access to the minimum resources necessary to perform their intended tasks
Separation of Services
Assigning different jobs to different servers.
3.
MATCH QUESTION
1 min • 5 pts
Match the following
Non-Repudiation
Ensures that no party in a communication can later deny their participation or the authenticity of their actions
Mobile Device Management
Enables organizations to administer and maintain portable devices and drives and even wipe them, if stolen.
Mantrap
Physical security measure that prevents unauthorized access by using an enclosed space with two interlocking doors
Kensington Lock
The process of identifying threats and vulnerabilities and then defining countermeasures to prevent them.
Threat Modeling
A physical security device designed to prevent theft or unauthorized removal of electronic devices like laptops, desktops
4.
MATCH QUESTION
1 min • 5 pts
Match the following terms to the correct definition
Accounting
Records user activity and resource usage. Part of the AAA framework
Availability
Determines which resources a user can access after successfully authentication. Part of the AAA framework
Integrity
Ensuring that authorized users can access data and systems when they need them. Part of the CIA triad.
Confidentiality
Maintaining the accuracy and trustworthiness of data. Part of the CIA triad
Authorization
The protection from unauthorized access. Part of the CIA triad.
5.
MATCH QUESTION
1 min • 5 pts
Match the following
Biometrics
Physical device or software app, that generate unique codes for "what you have" factor of authentication
Token
Unique biological or behavioral characteristics based on the "what you are" authentication factor
Smart Card
A numeric code used for "what you know" factor of authentication and access control
MFA
A physical card with an embedded chip that can be used for "what you have" factor of authentication
PIN
Requires users to prove their identity using two or more distinct authentication factors before gaining access
6.
MATCH QUESTION
1 min • 5 pts
Match the following
Buffer Overflow
Type of ransomware that prevents access to files.
SQL Injection
Uses specific database language statements run for the purpose of getting or changing information in a
database
Man-in-the-Browser
An injection of a bogus destination for an IP address
DNS Poisoning
The overloading of a reserved space for data that can overwrite other parts of memory or grant unauthorized access
Lock Screen
An on-path attack where a Trojan horse installed on a victim's computer can modify web transactions.
7.
MATCH QUESTION
1 min • 5 pts
Match the following
Incremental Backup
Copies all changes made since the last full backup
Differential Backup
isolates a computer or network from other networks, particularly the internet, to protect sensitive data
Full Backup
having backup systems and processes in place to ensure continued operation and data integrity in the event of a failure or cyberattack.
Airgapping
only backs up changes made since the previous backup
Redundancy
creates a complete copy of all data, including files, folders, and evvven the operating system, to a different location
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Scratch intro & Pen Commands Quiz
Quiz
•
1st - 10th Grade
15 questions
After Effect Intoduction
Quiz
•
10th Grade - University
10 questions
Légi közlekedés technikája
Quiz
•
9th - 12th Grade
10 questions
Quiz: Motherboard
Quiz
•
3rd Grade - University
10 questions
Filme - A Rede Social
Quiz
•
10th Grade
17 questions
BASES DE DATOS
Quiz
•
10th Grade
14 questions
Electronic Communication
Quiz
•
10th - 11th Grade
10 questions
FATO OU FAKE?!
Quiz
•
10th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade