Search Header Logo

Matching Quiz #2

Authored by Charles Carr

Instructional Technology

10th Grade

Used 2+ times

Matching Quiz #2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MATCH QUESTION

1 min • 5 pts

Match the following terms to the correct description

Vulnerability

The likelihood and potential impact of a harmful event happening to the network or data.

Exploit

A code, sequence of commands, or piece of software designed to take advantage of weakness in the system.

Attack Vector

a specific method or pathway used by an attacker to gain unauthorized access to a computer system

Risk

A potential danger or harmful event that could negatively affect the CIA of the network or data

Threat

A weakness or flaw in a system, application, or network that could be taken advantage of by an attacker

2.

MATCH QUESTION

1 min • 5 pts

Match the following Cybersecurity principles to appropriate definition.

Principal of Least Privilege

users should only have access to the minimum resources necessary to perform their intended tasks

Defense In Depth

Employing multiple layers of security controls, each designed to detect and prevent attacks at different stages

Principle of Zero Trust

Assigning different jobs to different servers.

Separation of Services

Every access must be authenticated and authorized before being granted access to resources

Hardening

The process of reducing the attack surface of devices, systems or networks.

3.

MATCH QUESTION

1 min • 5 pts

Match the following

Mantrap

Ensures that no party in a communication can later deny their participation or the authenticity of their actions

Threat Modeling

A physical security device designed to prevent theft or unauthorized removal of electronic devices like laptops, desktops

Non-Repudiation

The process of identifying threats and vulnerabilities and then defining countermeasures to prevent them.

Mobile Device Management

Physical security measure that prevents unauthorized access by using an enclosed space with two interlocking doors

Kensington Lock

Enables organizations to administer and maintain portable devices and drives and even wipe them, if stolen.

4.

MATCH QUESTION

1 min • 5 pts

Match the following terms to the correct definition

Accounting

Determines which resources a user can access after successfully authentication. Part of the AAA framework

Authorization

Maintaining the accuracy and trustworthiness of data. Part of the CIA triad

Integrity

Records user activity and resource usage. Part of the AAA framework

Confidentiality

The protection from unauthorized access. Part of the CIA triad.

Availability

Ensuring that authorized users can access data and systems when they need them. Part of the CIA triad.

5.

MATCH QUESTION

1 min • 5 pts

Match the following

Biometrics

A numeric code used for "what you know" factor of authentication and access control

PIN

Requires users to prove their identity using two or more distinct authentication factors before gaining access

Smart Card

Physical device or software app, that generate unique codes for "what you have" factor of authentication

MFA

A physical card with an embedded chip that can be used for "what you have" factor of authentication

Token

Unique biological or behavioral characteristics based on the "what you are" authentication factor

6.

MATCH QUESTION

1 min • 5 pts

Match the following

DNS Poisoning

The overloading of a reserved space for data that can overwrite other parts of memory or grant unauthorized access

Man-in-the-Browser

An injection of a bogus destination for an IP address

SQL Injection

Uses specific database language statements run for the purpose of getting or changing information in a

database

Buffer Overflow

Type of ransomware that prevents access to files.

Lock Screen

An on-path attack where a Trojan horse installed on a victim's computer can modify web transactions.

7.

MATCH QUESTION

1 min • 5 pts

Match the following

Airgapping

isolates a computer or network from other networks, particularly the internet, to protect sensitive data

Incremental Backup

Copies all changes made since the last full backup

Redundancy

having backup systems and processes in place to ensure continued operation and data integrity in the event of a failure or cyberattack.

Differential Backup

creates a complete copy of all data, including files, folders, and evvven the operating system, to a different location

Full Backup

only backs up changes made since the previous backup

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?