Search Header Logo

Matching Quiz #2

Authored by Charles Carr

Instructional Technology

10th Grade

Used 2+ times

Matching Quiz #2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MATCH QUESTION

1 min • 5 pts

Match the following terms to the correct description

Exploit

A code, sequence of commands, or piece of software designed to take advantage of weakness in the system.

Risk

A potential danger or harmful event that could negatively affect the CIA of the network or data

Threat

A weakness or flaw in a system, application, or network that could be taken advantage of by an attacker

Attack Vector

a specific method or pathway used by an attacker to gain unauthorized access to a computer system

Vulnerability

The likelihood and potential impact of a harmful event happening to the network or data.

2.

MATCH QUESTION

1 min • 5 pts

Match the following Cybersecurity principles to appropriate definition.

Hardening

Employing multiple layers of security controls, each designed to detect and prevent attacks at different stages

Principle of Zero Trust

The process of reducing the attack surface of devices, systems or networks.

Defense In Depth

Every access must be authenticated and authorized before being granted access to resources

Principal of Least Privilege

users should only have access to the minimum resources necessary to perform their intended tasks

Separation of Services

Assigning different jobs to different servers.

3.

MATCH QUESTION

1 min • 5 pts

Match the following

Non-Repudiation

Ensures that no party in a communication can later deny their participation or the authenticity of their actions

Mobile Device Management

Enables organizations to administer and maintain portable devices and drives and even wipe them, if stolen.

Mantrap

Physical security measure that prevents unauthorized access by using an enclosed space with two interlocking doors

Kensington Lock

The process of identifying threats and vulnerabilities and then defining countermeasures to prevent them.

Threat Modeling

A physical security device designed to prevent theft or unauthorized removal of electronic devices like laptops, desktops

4.

MATCH QUESTION

1 min • 5 pts

Match the following terms to the correct definition

Accounting

Records user activity and resource usage. Part of the AAA framework

Availability

Determines which resources a user can access after successfully authentication. Part of the AAA framework

Integrity

Ensuring that authorized users can access data and systems when they need them. Part of the CIA triad.

Confidentiality

Maintaining the accuracy and trustworthiness of data. Part of the CIA triad

Authorization

The protection from unauthorized access. Part of the CIA triad.

5.

MATCH QUESTION

1 min • 5 pts

Match the following

Biometrics

Physical device or software app, that generate unique codes for "what you have" factor of authentication

Token

Unique biological or behavioral characteristics based on the "what you are" authentication factor

Smart Card

A numeric code used for "what you know" factor of authentication and access control

MFA

A physical card with an embedded chip that can be used for "what you have" factor of authentication

PIN

Requires users to prove their identity using two or more distinct authentication factors before gaining access

6.

MATCH QUESTION

1 min • 5 pts

Match the following

Buffer Overflow

Type of ransomware that prevents access to files.

SQL Injection

Uses specific database language statements run for the purpose of getting or changing information in a

database

Man-in-the-Browser

An injection of a bogus destination for an IP address

DNS Poisoning

The overloading of a reserved space for data that can overwrite other parts of memory or grant unauthorized access

Lock Screen

An on-path attack where a Trojan horse installed on a victim's computer can modify web transactions.

7.

MATCH QUESTION

1 min • 5 pts

Match the following

Incremental Backup

Copies all changes made since the last full backup

Differential Backup

isolates a computer or network from other networks, particularly the internet, to protect sensitive data

Full Backup

having backup systems and processes in place to ensure continued operation and data integrity in the event of a failure or cyberattack.

Airgapping

only backs up changes made since the previous backup

Redundancy

creates a complete copy of all data, including files, folders, and evvven the operating system, to a different location

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology