
Matching Quiz #2
Authored by Charles Carr
Instructional Technology
10th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MATCH QUESTION
1 min • 5 pts
Match the following terms to the correct description
Vulnerability
The likelihood and potential impact of a harmful event happening to the network or data.
Exploit
A code, sequence of commands, or piece of software designed to take advantage of weakness in the system.
Attack Vector
a specific method or pathway used by an attacker to gain unauthorized access to a computer system
Risk
A potential danger or harmful event that could negatively affect the CIA of the network or data
Threat
A weakness or flaw in a system, application, or network that could be taken advantage of by an attacker
2.
MATCH QUESTION
1 min • 5 pts
Match the following Cybersecurity principles to appropriate definition.
Principal of Least Privilege
users should only have access to the minimum resources necessary to perform their intended tasks
Defense In Depth
Employing multiple layers of security controls, each designed to detect and prevent attacks at different stages
Principle of Zero Trust
Assigning different jobs to different servers.
Separation of Services
Every access must be authenticated and authorized before being granted access to resources
Hardening
The process of reducing the attack surface of devices, systems or networks.
3.
MATCH QUESTION
1 min • 5 pts
Match the following
Mantrap
Ensures that no party in a communication can later deny their participation or the authenticity of their actions
Threat Modeling
A physical security device designed to prevent theft or unauthorized removal of electronic devices like laptops, desktops
Non-Repudiation
The process of identifying threats and vulnerabilities and then defining countermeasures to prevent them.
Mobile Device Management
Physical security measure that prevents unauthorized access by using an enclosed space with two interlocking doors
Kensington Lock
Enables organizations to administer and maintain portable devices and drives and even wipe them, if stolen.
4.
MATCH QUESTION
1 min • 5 pts
Match the following terms to the correct definition
Accounting
Determines which resources a user can access after successfully authentication. Part of the AAA framework
Authorization
Maintaining the accuracy and trustworthiness of data. Part of the CIA triad
Integrity
Records user activity and resource usage. Part of the AAA framework
Confidentiality
The protection from unauthorized access. Part of the CIA triad.
Availability
Ensuring that authorized users can access data and systems when they need them. Part of the CIA triad.
5.
MATCH QUESTION
1 min • 5 pts
Match the following
Biometrics
A numeric code used for "what you know" factor of authentication and access control
PIN
Requires users to prove their identity using two or more distinct authentication factors before gaining access
Smart Card
Physical device or software app, that generate unique codes for "what you have" factor of authentication
MFA
A physical card with an embedded chip that can be used for "what you have" factor of authentication
Token
Unique biological or behavioral characteristics based on the "what you are" authentication factor
6.
MATCH QUESTION
1 min • 5 pts
Match the following
DNS Poisoning
The overloading of a reserved space for data that can overwrite other parts of memory or grant unauthorized access
Man-in-the-Browser
An injection of a bogus destination for an IP address
SQL Injection
Uses specific database language statements run for the purpose of getting or changing information in a
database
Buffer Overflow
Type of ransomware that prevents access to files.
Lock Screen
An on-path attack where a Trojan horse installed on a victim's computer can modify web transactions.
7.
MATCH QUESTION
1 min • 5 pts
Match the following
Airgapping
isolates a computer or network from other networks, particularly the internet, to protect sensitive data
Incremental Backup
Copies all changes made since the last full backup
Redundancy
having backup systems and processes in place to ensure continued operation and data integrity in the event of a failure or cyberattack.
Differential Backup
creates a complete copy of all data, including files, folders, and evvven the operating system, to a different location
Full Backup
only backs up changes made since the previous backup
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Tin học 6
Quiz
•
4th - 10th Grade
10 questions
Introduccíon a la ingenieria del Software
Quiz
•
1st - 10th Grade
13 questions
The Writing Process 5 steps
Quiz
•
9th - 12th Grade
18 questions
Animaciones en mblock
Quiz
•
10th Grade
10 questions
PROGRAMACIÓN SCRATCH
Quiz
•
6th - 11th Grade
11 questions
Repaso Microcontroladores (U3)
Quiz
•
10th - 11th Grade
10 questions
10º Relación de transmisión Poleas
Quiz
•
10th Grade
10 questions
Computer Viruses
Quiz
•
6th - 10th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Instructional Technology
15 questions
Making Inferences
Quiz
•
7th - 12th Grade
23 questions
TSI Math Vocabulary
Quiz
•
10th - 12th Grade
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
10 questions
Cell Organelles and Their Functions
Interactive video
•
6th - 10th Grade
10 questions
Plotting Points on a Coordinate Plane: Quadrant 1 Essentials
Interactive video
•
6th - 10th Grade
10 questions
Exploring Abiotic and Biotic Factors in Ecosystems
Interactive video
•
6th - 10th Grade
20 questions
SSS/SAS
Quiz
•
9th - 12th Grade
20 questions
Figurative Language Review
Quiz
•
10th Grade