Matching Quiz #2

Matching Quiz #2

10th Grade

14 Qs

quiz-placeholder

Similar activities

Network

Network

9th - 10th Grade

10 Qs

Lesson 22

Lesson 22

9th - 12th Grade

18 Qs

All About The Internet

All About The Internet

5th Grade - Professional Development

15 Qs

Scenario Based Questions

Scenario Based Questions

9th - 12th Grade

10 Qs

Introduction to MS Word

Introduction to MS Word

1st - 10th Grade

15 Qs

Digital Footprint & Passwords

Digital Footprint & Passwords

4th Grade - University

15 Qs

Computing

Computing

KG - University

12 Qs

Do you know your technology? - JMHS

Do you know your technology? - JMHS

9th - 12th Grade

10 Qs

Matching Quiz #2

Matching Quiz #2

Assessment

Quiz

Instructional Technology

10th Grade

Easy

Created by

Charles Carr

Used 2+ times

FREE Resource

14 questions

Show all answers

1.

MATCH QUESTION

1 min • 5 pts

Match the following terms to the correct description

Exploit

A potential danger or harmful event that could negatively affect the CIA of the network or data

Risk

The likelihood and potential impact of a harmful event happening to the network or data.

Vulnerability

A code, sequence of commands, or piece of software designed to take advantage of weakness in the system.

Threat

a specific method or pathway used by an attacker to gain unauthorized access to a computer system

Attack Vector

A weakness or flaw in a system, application, or network that could be taken advantage of by an attacker

2.

MATCH QUESTION

1 min • 5 pts

Match the following Cybersecurity principles to appropriate definition.

Separation of Services

Employing multiple layers of security controls, each designed to detect and prevent attacks at different stages

Defense In Depth

Every access must be authenticated and authorized before being granted access to resources

Principle of Zero Trust

The process of reducing the attack surface of devices, systems or networks.

Principal of Least Privilege

users should only have access to the minimum resources necessary to perform their intended tasks

Hardening

Assigning different jobs to different servers.

3.

MATCH QUESTION

1 min • 5 pts

Match the following

Threat Modeling

Enables organizations to administer and maintain portable devices and drives and even wipe them, if stolen.

Mobile Device Management

The process of identifying threats and vulnerabilities and then defining countermeasures to prevent them.

Mantrap

Physical security measure that prevents unauthorized access by using an enclosed space with two interlocking doors

Kensington Lock

Ensures that no party in a communication can later deny their participation or the authenticity of their actions

Non-Repudiation

A physical security device designed to prevent theft or unauthorized removal of electronic devices like laptops, desktops

4.

MATCH QUESTION

1 min • 5 pts

Match the following terms to the correct definition

Availability

The protection from unauthorized access. Part of the CIA triad.

Accounting

Determines which resources a user can access after successfully authentication. Part of the AAA framework

Authorization

Maintaining the accuracy and trustworthiness of data. Part of the CIA triad

Confidentiality

Ensuring that authorized users can access data and systems when they need them. Part of the CIA triad.

Integrity

Records user activity and resource usage. Part of the AAA framework

5.

MATCH QUESTION

1 min • 5 pts

Match the following

Token

A numeric code used for "what you know" factor of authentication and access control

PIN

Requires users to prove their identity using two or more distinct authentication factors before gaining access

Biometrics

A physical card with an embedded chip that can be used for "what you have" factor of authentication

MFA

Unique biological or behavioral characteristics based on the "what you are" authentication factor

Smart Card

Physical device or software app, that generate unique codes for "what you have" factor of authentication

6.

MATCH QUESTION

1 min • 5 pts

Match the following

Buffer Overflow

Uses specific database language statements run for the purpose of getting or changing information in a

database

Man-in-the-Browser

An injection of a bogus destination for an IP address

DNS Poisoning

Type of ransomware that prevents access to files.

SQL Injection

The overloading of a reserved space for data that can overwrite other parts of memory or grant unauthorized access

Lock Screen

An on-path attack where a Trojan horse installed on a victim's computer can modify web transactions.

7.

MATCH QUESTION

1 min • 5 pts

Match the following

Incremental Backup

isolates a computer or network from other networks, particularly the internet, to protect sensitive data

Airgapping

creates a complete copy of all data, including files, folders, and evvven the operating system, to a different location

Full Backup

Copies all changes made since the last full backup

Redundancy

only backs up changes made since the previous backup

Differential Backup

having backup systems and processes in place to ensure continued operation and data integrity in the event of a failure or cyberattack.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?