
Matching Quiz #2
Quiz
•
Instructional Technology
•
10th Grade
•
Easy
Charles Carr
Used 2+ times
FREE Resource
Enhance your content
14 questions
Show all answers
1.
MATCH QUESTION
1 min • 5 pts
Match the following terms to the correct description
Attack Vector
A code, sequence of commands, or piece of software designed to take advantage of weakness in the system.
Vulnerability
A potential danger or harmful event that could negatively affect the CIA of the network or data
Risk
a specific method or pathway used by an attacker to gain unauthorized access to a computer system
Threat
A weakness or flaw in a system, application, or network that could be taken advantage of by an attacker
Exploit
The likelihood and potential impact of a harmful event happening to the network or data.
2.
MATCH QUESTION
1 min • 5 pts
Match the following Cybersecurity principles to appropriate definition.
Separation of Services
Employing multiple layers of security controls, each designed to detect and prevent attacks at different stages
Principle of Zero Trust
users should only have access to the minimum resources necessary to perform their intended tasks
Hardening
Every access must be authenticated and authorized before being granted access to resources
Principal of Least Privilege
Assigning different jobs to different servers.
Defense In Depth
The process of reducing the attack surface of devices, systems or networks.
3.
MATCH QUESTION
1 min • 5 pts
Match the following
Mantrap
Physical security measure that prevents unauthorized access by using an enclosed space with two interlocking doors
Mobile Device Management
Ensures that no party in a communication can later deny their participation or the authenticity of their actions
Kensington Lock
The process of identifying threats and vulnerabilities and then defining countermeasures to prevent them.
Non-Repudiation
Enables organizations to administer and maintain portable devices and drives and even wipe them, if stolen.
Threat Modeling
A physical security device designed to prevent theft or unauthorized removal of electronic devices like laptops, desktops
4.
MATCH QUESTION
1 min • 5 pts
Match the following terms to the correct definition
Accounting
Ensuring that authorized users can access data and systems when they need them. Part of the CIA triad.
Authorization
The protection from unauthorized access. Part of the CIA triad.
Availability
Records user activity and resource usage. Part of the AAA framework
Confidentiality
Maintaining the accuracy and trustworthiness of data. Part of the CIA triad
Integrity
Determines which resources a user can access after successfully authentication. Part of the AAA framework
5.
MATCH QUESTION
1 min • 5 pts
Match the following
PIN
Requires users to prove their identity using two or more distinct authentication factors before gaining access
Biometrics
A numeric code used for "what you know" factor of authentication and access control
MFA
Unique biological or behavioral characteristics based on the "what you are" authentication factor
Token
Physical device or software app, that generate unique codes for "what you have" factor of authentication
Smart Card
A physical card with an embedded chip that can be used for "what you have" factor of authentication
6.
MATCH QUESTION
1 min • 5 pts
Match the following
Buffer Overflow
An injection of a bogus destination for an IP address
Man-in-the-Browser
An on-path attack where a Trojan horse installed on a victim's computer can modify web transactions.
Lock Screen
Uses specific database language statements run for the purpose of getting or changing information in a
database
DNS Poisoning
Type of ransomware that prevents access to files.
SQL Injection
The overloading of a reserved space for data that can overwrite other parts of memory or grant unauthorized access
7.
MATCH QUESTION
1 min • 5 pts
Match the following
Airgapping
having backup systems and processes in place to ensure continued operation and data integrity in the event of a failure or cyberattack.
Redundancy
Copies all changes made since the last full backup
Differential Backup
creates a complete copy of all data, including files, folders, and evvven the operating system, to a different location
Incremental Backup
isolates a computer or network from other networks, particularly the internet, to protect sensitive data
Full Backup
only backs up changes made since the previous backup
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
12 questions
comunidades virtuales
Quiz
•
10th - 12th Grade
13 questions
Energy Generation and Storage
Quiz
•
10th - 11th Grade
10 questions
MAQUINAS SIMPLES
Quiz
•
1st - 12th Grade
15 questions
Propietats dels materials II 2n PMAR
Quiz
•
9th - 11th Grade
15 questions
After Effect Intoduction
Quiz
•
10th Grade - University
14 questions
CĐ 2: Hình biểu diễn trên BVKT
Quiz
•
6th - 12th Grade
17 questions
circuitos
Quiz
•
7th - 12th Grade
10 questions
Digit Kult 10 - Táblázatkezelés - Betűk gyakorisága
Quiz
•
10th Grade
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
Discover more resources for Instructional Technology
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
11 questions
NFL Football logos
Quiz
•
KG - Professional Dev...
28 questions
Ser vs estar
Quiz
•
9th - 12th Grade
29 questions
CCG 2.2.3 Area
Quiz
•
9th - 12th Grade
10 questions
SAT Focus: Geometry
Quiz
•
10th Grade
15 questions
PRESENTE CONTINUO
Quiz
•
9th - 12th Grade
