Matching Quiz #2

Matching Quiz #2

10th Grade

14 Qs

quiz-placeholder

Similar activities

Cultura Digital

Cultura Digital

6th - 11th Grade

10 Qs

Interesting Bird Facts

Interesting Bird Facts

KG - Professional Development

11 Qs

Panel de discusión

Panel de discusión

1st - 10th Grade

11 Qs

Sesión 02

Sesión 02

1st - 12th Grade

10 Qs

Parte 0 Repaso electricidad

Parte 0 Repaso electricidad

10th Grade

18 Qs

Conecta IF

Conecta IF

9th - 12th Grade

18 Qs

FOOD AND BEVERAGE

FOOD AND BEVERAGE

10th - 12th Grade

10 Qs

REDES INFORMATICAS

REDES INFORMATICAS

6th - 12th Grade

10 Qs

Matching Quiz #2

Matching Quiz #2

Assessment

Quiz

Instructional Technology

10th Grade

Easy

Created by

Charles Carr

Used 2+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

14 questions

Show all answers

1.

MATCH QUESTION

1 min • 5 pts

Match the following terms to the correct description

Attack Vector

A code, sequence of commands, or piece of software designed to take advantage of weakness in the system.

Vulnerability

A potential danger or harmful event that could negatively affect the CIA of the network or data

Risk

a specific method or pathway used by an attacker to gain unauthorized access to a computer system

Threat

A weakness or flaw in a system, application, or network that could be taken advantage of by an attacker

Exploit

The likelihood and potential impact of a harmful event happening to the network or data.

2.

MATCH QUESTION

1 min • 5 pts

Match the following Cybersecurity principles to appropriate definition.

Separation of Services

Employing multiple layers of security controls, each designed to detect and prevent attacks at different stages

Principle of Zero Trust

users should only have access to the minimum resources necessary to perform their intended tasks

Hardening

Every access must be authenticated and authorized before being granted access to resources

Principal of Least Privilege

Assigning different jobs to different servers.

Defense In Depth

The process of reducing the attack surface of devices, systems or networks.

3.

MATCH QUESTION

1 min • 5 pts

Match the following

Mantrap

Physical security measure that prevents unauthorized access by using an enclosed space with two interlocking doors

Mobile Device Management

Ensures that no party in a communication can later deny their participation or the authenticity of their actions

Kensington Lock

The process of identifying threats and vulnerabilities and then defining countermeasures to prevent them.

Non-Repudiation

Enables organizations to administer and maintain portable devices and drives and even wipe them, if stolen.

Threat Modeling

A physical security device designed to prevent theft or unauthorized removal of electronic devices like laptops, desktops

4.

MATCH QUESTION

1 min • 5 pts

Match the following terms to the correct definition

Accounting

Ensuring that authorized users can access data and systems when they need them. Part of the CIA triad.

Authorization

The protection from unauthorized access. Part of the CIA triad.

Availability

Records user activity and resource usage. Part of the AAA framework

Confidentiality

Maintaining the accuracy and trustworthiness of data. Part of the CIA triad

Integrity

Determines which resources a user can access after successfully authentication. Part of the AAA framework

5.

MATCH QUESTION

1 min • 5 pts

Match the following

PIN

Requires users to prove their identity using two or more distinct authentication factors before gaining access

Biometrics

A numeric code used for "what you know" factor of authentication and access control

MFA

Unique biological or behavioral characteristics based on the "what you are" authentication factor

Token

Physical device or software app, that generate unique codes for "what you have" factor of authentication

Smart Card

A physical card with an embedded chip that can be used for "what you have" factor of authentication

6.

MATCH QUESTION

1 min • 5 pts

Match the following

Buffer Overflow

An injection of a bogus destination for an IP address

Man-in-the-Browser

An on-path attack where a Trojan horse installed on a victim's computer can modify web transactions.

Lock Screen

Uses specific database language statements run for the purpose of getting or changing information in a

database

DNS Poisoning

Type of ransomware that prevents access to files.

SQL Injection

The overloading of a reserved space for data that can overwrite other parts of memory or grant unauthorized access

7.

MATCH QUESTION

1 min • 5 pts

Match the following

Airgapping

having backup systems and processes in place to ensure continued operation and data integrity in the event of a failure or cyberattack.

Redundancy

Copies all changes made since the last full backup

Differential Backup

creates a complete copy of all data, including files, folders, and evvven the operating system, to a different location

Incremental Backup

isolates a computer or network from other networks, particularly the internet, to protect sensitive data

Full Backup

only backs up changes made since the previous backup

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?