
Matching Quiz #2

Quiz
•
Instructional Technology
•
10th Grade
•
Easy

Charles Carr
Used 2+ times
FREE Resource
14 questions
Show all answers
1.
MATCH QUESTION
1 min • 5 pts
Match the following terms to the correct description
Exploit
A potential danger or harmful event that could negatively affect the CIA of the network or data
Risk
The likelihood and potential impact of a harmful event happening to the network or data.
Vulnerability
A code, sequence of commands, or piece of software designed to take advantage of weakness in the system.
Threat
a specific method or pathway used by an attacker to gain unauthorized access to a computer system
Attack Vector
A weakness or flaw in a system, application, or network that could be taken advantage of by an attacker
2.
MATCH QUESTION
1 min • 5 pts
Match the following Cybersecurity principles to appropriate definition.
Separation of Services
Employing multiple layers of security controls, each designed to detect and prevent attacks at different stages
Defense In Depth
Every access must be authenticated and authorized before being granted access to resources
Principle of Zero Trust
The process of reducing the attack surface of devices, systems or networks.
Principal of Least Privilege
users should only have access to the minimum resources necessary to perform their intended tasks
Hardening
Assigning different jobs to different servers.
3.
MATCH QUESTION
1 min • 5 pts
Match the following
Threat Modeling
Enables organizations to administer and maintain portable devices and drives and even wipe them, if stolen.
Mobile Device Management
The process of identifying threats and vulnerabilities and then defining countermeasures to prevent them.
Mantrap
Physical security measure that prevents unauthorized access by using an enclosed space with two interlocking doors
Kensington Lock
Ensures that no party in a communication can later deny their participation or the authenticity of their actions
Non-Repudiation
A physical security device designed to prevent theft or unauthorized removal of electronic devices like laptops, desktops
4.
MATCH QUESTION
1 min • 5 pts
Match the following terms to the correct definition
Availability
The protection from unauthorized access. Part of the CIA triad.
Accounting
Determines which resources a user can access after successfully authentication. Part of the AAA framework
Authorization
Maintaining the accuracy and trustworthiness of data. Part of the CIA triad
Confidentiality
Ensuring that authorized users can access data and systems when they need them. Part of the CIA triad.
Integrity
Records user activity and resource usage. Part of the AAA framework
5.
MATCH QUESTION
1 min • 5 pts
Match the following
Token
A numeric code used for "what you know" factor of authentication and access control
PIN
Requires users to prove their identity using two or more distinct authentication factors before gaining access
Biometrics
A physical card with an embedded chip that can be used for "what you have" factor of authentication
MFA
Unique biological or behavioral characteristics based on the "what you are" authentication factor
Smart Card
Physical device or software app, that generate unique codes for "what you have" factor of authentication
6.
MATCH QUESTION
1 min • 5 pts
Match the following
Buffer Overflow
Uses specific database language statements run for the purpose of getting or changing information in a
database
Man-in-the-Browser
An injection of a bogus destination for an IP address
DNS Poisoning
Type of ransomware that prevents access to files.
SQL Injection
The overloading of a reserved space for data that can overwrite other parts of memory or grant unauthorized access
Lock Screen
An on-path attack where a Trojan horse installed on a victim's computer can modify web transactions.
7.
MATCH QUESTION
1 min • 5 pts
Match the following
Incremental Backup
isolates a computer or network from other networks, particularly the internet, to protect sensitive data
Airgapping
creates a complete copy of all data, including files, folders, and evvven the operating system, to a different location
Full Backup
Copies all changes made since the last full backup
Redundancy
only backs up changes made since the previous backup
Differential Backup
having backup systems and processes in place to ensure continued operation and data integrity in the event of a failure or cyberattack.
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
All About The Internet

Quiz
•
5th Grade - Professio...
15 questions
Introduction to MS Word

Quiz
•
1st - 10th Grade
15 questions
Digital Footprint & Passwords

Quiz
•
4th Grade - University
15 questions
Digital Citizenship

Quiz
•
5th - 12th Grade
15 questions
EMTECH Q3 M1, ICT

Quiz
•
10th Grade - University
12 questions
Computing

Quiz
•
KG - University
10 questions
Network

Quiz
•
9th - 10th Grade
18 questions
Lesson 22

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
Discover more resources for Instructional Technology
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
10 questions
Characteristics of Life

Quiz
•
9th - 10th Grade
10 questions
Essential Lab Safety Practices

Interactive video
•
6th - 10th Grade
62 questions
Spanish Speaking Countries, Capitals, and Locations

Quiz
•
9th - 12th Grade
20 questions
First Day of School

Quiz
•
6th - 12th Grade
21 questions
Arithmetic Sequences

Quiz
•
9th - 12th Grade